Action not permitted
Modal body text goes here.
cve-2021-29923
Vulnerability from cvelistv5
Published
2021-08-07 16:38
Modified
2024-08-03 22:18
Severity ?
EPSS score ?
Summary
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis | Third Party Advisory | |
cve@mitre.org | https://github.com/golang/go/issues/30999 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/golang/go/issues/43389 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md | Exploit, Third Party Advisory | |
cve@mitre.org | https://go-review.googlesource.com/c/go/+/325829/ | Patch, Third Party Advisory | |
cve@mitre.org | https://golang.org/pkg/net/#ParseCIDR | Vendor Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/ | ||
cve@mitre.org | https://security.gentoo.org/glsa/202208-02 | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:18:03.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://golang.org/pkg/net/#ParseCIDR" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/golang/go/issues/43389" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/golang/go/issues/30999" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://go-review.googlesource.com/c/go/+/325829/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md" }, { "name": "FEDORA-2022-17d004ed71", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-04T15:09:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://golang.org/pkg/net/#ParseCIDR" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/golang/go/issues/43389" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/golang/go/issues/30999" }, { "tags": [ "x_refsource_MISC" ], "url": "https://go-review.googlesource.com/c/go/+/325829/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md" }, { "name": "FEDORA-2022-17d004ed71", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-29923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://golang.org/pkg/net/#ParseCIDR", "refsource": "MISC", "url": "https://golang.org/pkg/net/#ParseCIDR" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis", "refsource": "MISC", "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "name": "https://github.com/golang/go/issues/43389", "refsource": "MISC", "url": "https://github.com/golang/go/issues/43389" }, { "name": "https://github.com/golang/go/issues/30999", "refsource": "MISC", "url": "https://github.com/golang/go/issues/30999" }, { "name": "https://go-review.googlesource.com/c/go/+/325829/", "refsource": "MISC", "url": "https://go-review.googlesource.com/c/go/+/325829/" }, { "name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md", "refsource": "MISC", "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md" }, { "name": "FEDORA-2022-17d004ed71", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-29923", "datePublished": "2021-08-07T16:38:59", "dateReserved": "2021-04-01T00:00:00", "dateUpdated": "2024-08-03T22:18:03.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-29923\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-08-07T17:15:07.067\",\"lastModified\":\"2023-11-07T03:32:45.383\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.\"},{\"lang\":\"es\",\"value\":\"Go versiones anteriores a 1.17, no considera apropiadamente los caracteres cero extra\u00f1os al principio de un octeto de direcci\u00f3n IP, lo que (en algunas situaciones) permite a atacantes omitir el control de acceso que es basado en las direcciones IP, debido a una interpretaci\u00f3n octal inesperada. Esto afecta a net.ParseIP y net.ParseCIDR\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.17\",\"matchCriteriaId\":\"D39D5C21-8281-429F-AC33-CE39821CA3EC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.1.1.0\",\"matchCriteriaId\":\"20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}],\"references\":[{\"url\":\"https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/30999\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/43389\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://go-review.googlesource.com/c/go/+/325829/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://golang.org/pkg/net/#ParseCIDR\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2022_0434
Vulnerability from csaf_redhat
Published
2022-02-03 20:05
Modified
2024-11-06 00:26
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0
Notes
Topic
Release of OpenShift Serverless 1.20.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: Command-line arguments may overwrite global data (CVE-2021-38297)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0434", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "2024838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024838" }, { "category": "external", "summary": "2024839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024839" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0434.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0", "tracking": { "current_release_date": "2024-11-06T00:26:01+00:00", "generator": { "date": "2024-11-06T00:26:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0434", "initial_release_date": "2022-02-03T20:05:14+00:00", "revision_history": [ { "date": "2022-02-03T20:05:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-03T20:05:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:26:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.20", "product": { "name": "Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.20::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.20.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T20:05:14+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-38297", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2012887" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: Command-line arguments may overwrite global data", "title": "Vulnerability summary" }, { "category": "other", "text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38297" }, { "category": "external", "summary": "RHBZ#2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A", "url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A" } ], "release_date": "2021-10-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T20:05:14+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: Command-line arguments may overwrite global data" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T20:05:14+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0434" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
rhsa-2022_0997
Vulnerability from csaf_redhat
Published
2022-03-23 22:11
Modified
2024-11-06 00:36
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-qpid-apache) security update
Notes
Topic
An update for golang-qpid-apache is now available for Red Hat OpenStack
Platform 16.2 (Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Golang binding library for qpid-proton
Security Fix(es):
* net: incorrect parsing of extraneous zero characters at the beginning of
an IP address octet (CVE-2021-29923)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang-qpid-apache is now available for Red Hat OpenStack\nPlatform 16.2 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Golang binding library for qpid-proton\n\nSecurity Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0997", "url": "https://access.redhat.com/errata/RHSA-2022:0997" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0997.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-qpid-apache) security update", "tracking": { "current_release_date": "2024-11-06T00:36:06+00:00", "generator": { "date": "2024-11-06T00:36:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0997", "initial_release_date": "2022-03-23T22:11:36+00:00", "revision_history": [ { "date": "2022-03-23T22:11:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T22:11:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:36:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "product": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "product": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "product": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le" }, "product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src" }, "product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" }, "product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T22:11:36+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0997" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.2:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" } ] }
rhsa-2021_4725
Vulnerability from csaf_redhat
Published
2021-11-17 18:39
Modified
2024-11-06 00:10
Summary
Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 2.6.8 images:
RHEL-8-CNV-2.6
==============
kubevirt-v2v-conversion-container-v2.6.8-1
hyperconverged-cluster-webhook-container-v2.6.8-1
vm-import-controller-container-v2.6.8-1
kubevirt-cpu-model-nfd-plugin-container-v2.6.8-2
vm-import-operator-container-v2.6.8-1
kubevirt-cpu-node-labeller-container-v2.6.8-1
kubevirt-ssp-operator-container-v2.6.8-1
kubemacpool-container-v2.6.8-1
cluster-network-addons-operator-container-v2.6.8-1
virt-cdi-cloner-container-v2.6.8-1
virt-cdi-uploadproxy-container-v2.6.8-1
kubernetes-nmstate-handler-container-v2.6.8-1
ovs-cni-plugin-container-v2.6.8-1
ovs-cni-marker-container-v2.6.8-1
hostpath-provisioner-operator-container-v2.6.8-1
kubevirt-vmware-container-v2.6.8-2
kubevirt-template-validator-container-v2.6.8-2
kubevirt-kvm-info-nfd-plugin-container-v2.6.8-1
node-maintenance-operator-container-v2.6.8-1
vm-import-virtv2v-container-v2.6.8-1
hostpath-provisioner-container-v2.6.8-1
virt-cdi-uploadserver-container-v2.6.8-1
cnv-containernetworking-plugins-container-v2.6.8-1
virtio-win-container-v2.6.8-2
virt-cdi-controller-container-v2.6.8-1
virt-cdi-importer-container-v2.6.8-1
virt-cdi-apiserver-container-v2.6.8-1
virt-cdi-operator-container-v2.6.8-1
bridge-marker-container-v2.6.8-1
hyperconverged-cluster-operator-container-v2.6.8-1
cnv-must-gather-container-v2.6.8-5
virt-launcher-container-v2.6.8-5
virt-operator-container-v2.6.8-5
virt-api-container-v2.6.8-5
virt-controller-container-v2.6.8-5
virt-handler-container-v2.6.8-5
hco-bundle-registry-container-v2.6.8-23
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.8 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-v2v-conversion-container-v2.6.8-1\nhyperconverged-cluster-webhook-container-v2.6.8-1\nvm-import-controller-container-v2.6.8-1\nkubevirt-cpu-model-nfd-plugin-container-v2.6.8-2\nvm-import-operator-container-v2.6.8-1\nkubevirt-cpu-node-labeller-container-v2.6.8-1\nkubevirt-ssp-operator-container-v2.6.8-1\nkubemacpool-container-v2.6.8-1\ncluster-network-addons-operator-container-v2.6.8-1\nvirt-cdi-cloner-container-v2.6.8-1\nvirt-cdi-uploadproxy-container-v2.6.8-1\nkubernetes-nmstate-handler-container-v2.6.8-1\novs-cni-plugin-container-v2.6.8-1\novs-cni-marker-container-v2.6.8-1\nhostpath-provisioner-operator-container-v2.6.8-1\nkubevirt-vmware-container-v2.6.8-2\nkubevirt-template-validator-container-v2.6.8-2\nkubevirt-kvm-info-nfd-plugin-container-v2.6.8-1\nnode-maintenance-operator-container-v2.6.8-1\nvm-import-virtv2v-container-v2.6.8-1\nhostpath-provisioner-container-v2.6.8-1\nvirt-cdi-uploadserver-container-v2.6.8-1\ncnv-containernetworking-plugins-container-v2.6.8-1\nvirtio-win-container-v2.6.8-2\nvirt-cdi-controller-container-v2.6.8-1\nvirt-cdi-importer-container-v2.6.8-1\nvirt-cdi-apiserver-container-v2.6.8-1\nvirt-cdi-operator-container-v2.6.8-1\nbridge-marker-container-v2.6.8-1\nhyperconverged-cluster-operator-container-v2.6.8-1\ncnv-must-gather-container-v2.6.8-5\nvirt-launcher-container-v2.6.8-5\nvirt-operator-container-v2.6.8-5\nvirt-api-container-v2.6.8-5\nvirt-controller-container-v2.6.8-5\nvirt-handler-container-v2.6.8-5\nhco-bundle-registry-container-v2.6.8-23\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4725", "url": "https://access.redhat.com/errata/RHSA-2021:4725" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1998844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998844" }, { "category": "external", "summary": "2008522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008522" }, { "category": "external", "summary": "2010334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010334" }, { "category": "external", "summary": "2012328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012328" }, { "category": "external", "summary": "2013494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013494" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4725.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update", "tracking": { "current_release_date": "2024-11-06T00:10:43+00:00", "generator": { "date": "2024-11-06T00:10:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4725", "initial_release_date": "2021-11-17T18:39:29+00:00", "revision_history": [ { "date": "2021-11-17T18:39:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-17T18:39:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:10:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 2.6 for RHEL 8", "product": { "name": "CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.8-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.8-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "product": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.8-1" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "product": { "name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "product_id": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.8-1" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.8-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64" }, "product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "relates_to_product_reference": "8Base-CNV-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64" ], "known_not_affected": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-17T18:39:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4725" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-17T18:39:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4725" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:1c1628b639e26d05faf413c775d22d4a0ddd51d033473f740b2741b3d81e1716_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:5888aa247f7e7a1e1e169fc224854527fa314e617d567c4fc6a36666ef783218_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:c4bf7b19fa46e3ce2e43051a9b108662f0061325ab417aaca71b00c3821910eb_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:be60d10cd7bc87227136534878dc750f59da0a97eb2cc74f331e80e681feb098_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_4910
Vulnerability from csaf_redhat
Published
2021-12-02 14:27
Modified
2024-11-06 00:13
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.8.3 RPMs security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.8.3 RPMs.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.8.3 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4910", "url": "https://access.redhat.com/errata/RHSA-2021:4910" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2007344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4910.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.3 RPMs security and bug fix update", "tracking": { "current_release_date": "2024-11-06T00:13:41+00:00", "generator": { "date": "2024-11-06T00:13:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4910", "initial_release_date": "2021-12-02T14:27:54+00:00", "revision_history": [ { "date": "2021-12-02T14:27:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-02T14:27:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:13:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.8 for RHEL 7", "product": { "name": "CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el7" } } }, { "category": "product_name", "name": "CNV 4.8 for RHEL 8", "product": { "name": "CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "kubevirt-0:4.8.3-251.el7.src", "product": { "name": "kubevirt-0:4.8.3-251.el7.src", "product_id": "kubevirt-0:4.8.3-251.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.8.3-251.el7?arch=src" } } }, { "category": "product_version", "name": "kubevirt-0:4.8.3-251.el8.src", "product": { "name": "kubevirt-0:4.8.3-251.el8.src", "product_id": "kubevirt-0:4.8.3-251.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.8.3-251.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "product": { "name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "product_id": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.3-251.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.3-251.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "product": { "name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "product_id": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.3-251.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.3-251.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.8.3-251.el7.src as a component of CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src" }, "product_reference": "kubevirt-0:4.8.3-251.el7.src", "relates_to_product_reference": "7Server-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64 as a component of CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64 as a component of CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.8.3-251.el8.src as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src" }, "product_reference": "kubevirt-0:4.8.3-251.el8.src", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-02T14:27:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4910" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-CNV-4.8:kubevirt-0:4.8.3-251.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.3-251.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.3-251.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.3-251.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" } ] }
rhsa-2022_0989
Vulnerability from csaf_redhat
Published
2022-03-24 10:58
Modified
2024-11-06 00:36
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-qpid-apache) security update
Notes
Topic
An update for golang-qpid-apache is now available for Red Hat OpenStack
Platform 16.1 (Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Golang binding library for qpid-proton
Security Fix(es):
* net: incorrect parsing of extraneous zero characters at the beginning of
an IP address octet (CVE-2021-29923)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang-qpid-apache is now available for Red Hat OpenStack\nPlatform 16.1 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Golang binding library for qpid-proton\n\nSecurity Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0989", "url": "https://access.redhat.com/errata/RHSA-2022:0989" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0989.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-qpid-apache) security update", "tracking": { "current_release_date": "2024-11-06T00:36:45+00:00", "generator": { "date": "2024-11-06T00:36:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0989", "initial_release_date": "2022-03-24T10:58:33+00:00", "revision_history": [ { "date": "2022-03-24T10:58:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T10:58:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:36:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "product": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "product": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "product": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "product_id": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-qpid-apache@0.32.0-rc1.9.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le" }, "product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src" }, "product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" }, "product_reference": "golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T10:58:33+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.ppc64le", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.src", "8Base-RHOS-16.1:golang-qpid-apache-0:0.32.0-rc1.9.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" } ] }
rhsa-2022_0561
Vulnerability from csaf_redhat
Published
2022-02-23 12:57
Modified
2024-11-06 00:29
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.9.22 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.9.22. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHSA-2022:0557
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
You may download the oc tool and use it to inspect release image metadata
as follows:
(For x86_64 architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-x86_64
The image digest is
sha256:912e4b9986f690b894fcb740881e780600e12ab22f128f6f873bc4e1fcda8d13
(For s390x architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-s390x
The image digest is
sha256:fa19f34390bc50968af736bdedb193b36d5d832b1090bf215e1fe279f05d6c94
(For ppc64le architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le
The image digest is
sha256:857cab82eba0ad370669258da450b89d8c6e5cea25c61ee930f9e30bfcd515dd
All OpenShift Container Platform 4.9 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.9.22. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2022:0557\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n$ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-x86_64\n\nThe image digest is\nsha256:912e4b9986f690b894fcb740881e780600e12ab22f128f6f873bc4e1fcda8d13\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-s390x\n\nThe image digest is\nsha256:fa19f34390bc50968af736bdedb193b36d5d832b1090bf215e1fe279f05d6c94\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.6.20-ppc64le\n\nThe image digest is\nsha256:857cab82eba0ad370669258da450b89d8c6e5cea25c61ee930f9e30bfcd515dd\n\nAll OpenShift Container Platform 4.9 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0561", "url": "https://access.redhat.com/errata/RHSA-2022:0561" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2015706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015706" }, { "category": "external", "summary": "2022158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022158" }, { "category": "external", "summary": "2023339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023339" }, { "category": "external", "summary": "2026553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026553" }, { "category": "external", "summary": "2028250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028250" }, { "category": "external", "summary": "2028812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028812" }, { "category": "external", "summary": "2029867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029867" }, { "category": "external", "summary": "2032985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032985" }, { "category": "external", "summary": "2033274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033274" }, { "category": "external", "summary": "2033672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033672" }, { "category": "external", "summary": "2038252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038252" }, { "category": "external", "summary": "2042444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042444" }, { "category": "external", "summary": "2042494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042494" }, { "category": "external", "summary": "2042677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042677" }, { "category": "external", "summary": "2043650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043650" }, { "category": "external", "summary": "2043807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043807" }, { "category": "external", "summary": "2046476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046476" }, { "category": "external", "summary": "2047350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047350" }, { "category": "external", "summary": "2048173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048173" }, { "category": "external", "summary": "2049774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049774" }, { "category": "external", "summary": "2050311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050311" }, { "category": "external", "summary": "2051523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051523" }, { "category": "external", "summary": "2052063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052063" }, { "category": "external", "summary": "2052549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052549" }, { "category": "external", "summary": "2052850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052850" }, { "category": "external", "summary": "2053222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053222" }, { "category": "external", "summary": "2053496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053496" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0561.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update", "tracking": { "current_release_date": "2024-11-06T00:29:52+00:00", "generator": { "date": "2024-11-06T00:29:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0561", "initial_release_date": "2022-02-23T12:57:44+00:00", "revision_history": [ { "date": "2022-02-23T12:57:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-23T12:57:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:29:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "product_id": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "product": { "name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "product_id": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "product_id": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gfd2d838.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.9.0-202202120107.p0.g0e0c173.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "product_id": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "product_id": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "product": { "name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "product_id": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "product": { "name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "product_id": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "product": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.9.0-202202120107.p0.g90b5722.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "product": { "name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "product_id": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "product_id": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "product": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g1e8c94f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "product_id": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "product": { "name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "product_id": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "product_id": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "product": { "name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "product_id": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "product": { "name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "product_id": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "product": { "name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "product_id": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "product": { "name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "product_id": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "product": { "name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "product_id": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "product": { "name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "product_id": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "product": { "name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "product_id": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "product": { "name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "product_id": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "product": { "name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "product_id": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "product": { "name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "product_id": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "product_id": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "product_id": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "product": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g18d82a6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g26f1b6f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "product": { "name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "product_id": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g8226e86.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g37a1328.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "product": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "product_id": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gc02678d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "product": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "product_id": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-node-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gc02678d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gade7373.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g15e474c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "product": { "name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "product_id": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g3bf2b7f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "product_id": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "product": { "name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "product_id": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "product_id": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "product": { "name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "product_id": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "product_id": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "product": { "name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "product_id": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "product": { "name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "product_id": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.gd92b088.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g48d49f7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.gd8a891d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "product": { "name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "product_id": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "product_id": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "product": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "product_id": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "product": { "name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "product_id": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "product_id": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "product": { "name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "product_id": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "product_id": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "product_id": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "product_id": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "product": { "name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "product_id": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "product": { "name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "product_id": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g9f56afd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "product": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "product_id": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g9f56afd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "product": { "name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "product_id": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-problem-detector-rhel8\u0026tag=v4.9.0-202202120107.p0.gde8606f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "product_id": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "product_id": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "product": { "name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "product_id": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "product": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "product_id": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-syncer-rhel8\u0026tag=v4.9.0-202202120107.p0.g4ece3d1.assembly.stream" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "product_id": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "product_id": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "product_id": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "product": { "name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "product_id": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "product": { "name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "product_id": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "product_id": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "product_id": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "product_id": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "product": { "name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "product_id": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "product": { "name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "product_id": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "product": { "name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "product_id": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "product": { "name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "product_id": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "product_id": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "product": { "name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "product_id": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "product": { "name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "product_id": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "product": { "name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "product_id": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "product": { "name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "product_id": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "product": { "name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "product_id": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "product": { "name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "product_id": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "product": { "name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "product_id": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "product": { "name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "product_id": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "product": { "name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "product_id": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "product": { "name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "product_id": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "product": { "name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "product_id": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "product": { "name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "product_id": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "product": { "name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "product_id": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "product": { "name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "product_id": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "product": { "name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "product_id": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "product_id": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "product_id": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "product_id": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "product_id": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "product_id": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "product_id": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "product_id": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "product_id": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "product_id": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "product": { "name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "product_id": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "product": { "name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "product_id": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "product": { "name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "product_id": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "product_id": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "product": { "name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "product_id": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "product": { "name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "product_id": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "product": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "product_id": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "product": { "name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "product_id": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "product": { "name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "product_id": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "product_id": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "product_id": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "product": { "name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "product_id": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "product_id": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "product": { "name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "product_id": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "product": { "name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "product_id": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "product_id": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "product": { "name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "product_id": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "product_id": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "product_id": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "product_id": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "product": { "name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "product_id": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "product": { "name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "product_id": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "product_id": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gfd2d838.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.9.0-202202120107.p0.g0e0c173.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "product_id": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "product_id": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "product": { "name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "product_id": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "product": { "name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "product_id": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "product": { "name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "product_id": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "product": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.9.0-202202120107.p0.g90b5722.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "product": { "name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "product_id": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "product_id": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "product": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g1e8c94f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "product": { "name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "product_id": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "product": { "name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "product_id": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "product": { "name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "product_id": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "product": { "name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "product_id": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "product": { "name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "product_id": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "product": { "name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "product_id": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "product": { "name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "product_id": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "product": { "name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "product_id": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "product": { "name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "product_id": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "product": { "name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "product_id": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "product": { "name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "product_id": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "product": { "name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "product_id": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "product": { "name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "product_id": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "product": { "name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "product_id": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "product": { "name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "product_id": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "product_id": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "product_id": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "product_id": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "product_id": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "product_id": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "product_id": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "product_id": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "product_id": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "product_id": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "product": { "name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "product_id": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "product": { "name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "product_id": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.gd92b088.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g48d49f7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.gd8a891d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "product": { "name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "product_id": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "product": { "name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "product_id": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "product_id": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "product": { "name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "product_id": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "product": { "name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "product_id": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "product": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "product_id": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "product": { "name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "product_id": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "product": { "name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "product_id": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "product_id": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "product_id": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "product": { "name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "product_id": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "product_id": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "product": { "name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "product_id": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "product": { "name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "product_id": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "product_id": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "product": { "name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "product_id": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.9.0-202202120107.p0.g68fe93a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g1c81cab.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g19c4e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202120107.p0.gae7b0a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "product_id": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.9.0-202202152352.p0.g4d93655.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.9.0-202202120107.p0.gce0b3ae.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "product_id": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.9.0-202202120107.p0.gf2551e5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "product_id": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.9.0-202202120107.p0.gb84b5bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "product": { "name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "product_id": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.9.0-202202120107.p0.g3cb11c0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "product_id": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.9.0-202202120107.p0.g0a1737c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "product_id": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.9.0-202202120107.p0.gc13c3a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.9.0-202202120107.p0.g3e02b07.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "product_id": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.9.0-202202120107.p0.g7736e72.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "product_id": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.9.0-202202120107.p0.g9ea1ebc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.9.0-202202120107.p0.g579e3c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.9.0-202202120107.p0.g1ab97f3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "product": { "name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "product_id": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.9.0-202202120107.p0.g3197fa7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "product": { "name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "product_id": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.9.0-202202120107.p0.g6130ba8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "product": { "name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "product_id": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.9.0-202202120107.p0.g58e0929.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "product_id": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.9.0-202202120107.p0.g6e41dbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "product_id": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.9.0-202202120107.p0.g8594727.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "product": { "name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "product_id": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.9.0-202202120107.p0.gc249937.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.9.0-202202120107.p0.g1ee9925.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "product": { "name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "product_id": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.9.0-202202120107.p0.g7e2e890.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "product": { "name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "product_id": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "product": { "name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "product_id": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202151621.p0.gc60ddb0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "product": { "name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "product_id": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.9.0-202202120107.p0.gfdcb82f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "product": { "name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "product_id": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "product": { "name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "product_id": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.9.0-202202120107.p0.g2d1e1f4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "product": { "name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "product_id": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "product": { "name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "product_id": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.9.0-202202120107.p0.gb93fd35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "product": { "name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "product_id": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.9.0-202202131427.p0.gab2eaa5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "product": { "name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "product_id": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202140924.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "product": { "name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "product_id": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.9.0-202202120107.p0.g689af8b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "product": { "name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "product_id": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.9.0-202202120107.p0.g3cd421d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "product": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g18d82a6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.g26f1b6f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.ge8e2cb3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "product": { "name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "product_id": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g8226e86.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g37a1328.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g6e62a54.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.9.0-202202152352.p0.g5113d1b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "product_id": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.9.0-202202120107.p0.gd642d11.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.9.0-202202120107.p0.g1d05f80.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.9.0-202202120107.p0.gbc20153.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g10af6a9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.9.0-202202120107.p0.g7e074a7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.9.0-202202120107.p0.g1826b16.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "product_id": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.9.0-202202120107.p0.g184a513.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.gc750d4b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.9.0-202202120107.p0.geedd0dc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.9.0-202202120107.p0.gd886c13.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.9.0-202202120107.p0.g07c25a6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.ga895470.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g78b8e48.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.9.0-202202120107.p0.g5694bdd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g7245b0f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.9.0-202202120107.p0.g993ec9f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.9.0-202202120107.p0.gd293c31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.9.0-202202120107.p0.g3015cb8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g9302429.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g8fbffaf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.9.0-202202120107.p0.g9b0a9d7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.9.0-202202120107.p0.g2e76e02.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.9.0-202202120107.p0.g44a4913.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "product_id": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.9.0-202202120107.p0.gdad46d0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.9.0-202202120107.p0.g52ab893.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "product_id": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g099b756.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "product": { "name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "product_id": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.9.0-202202120107.p0.gf99cada.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g3f1401a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "product_id": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202120417.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "product": { "name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "product_id": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202120107.p0.ge9a66d5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202140924.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.9.0-202202120107.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.9.0-202202120107.p0.g59ae2ed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "product_id": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.9.0-202202120107.p0.g383c9b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "product_id": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202150825.p0.gd84a7f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "product": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "product_id": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel8\u0026tag=v4.9.0-202202120107.p0.g266597b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "product_id": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.9.0-202202120107.p0.g3c28a57.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.9.0-202202120107.p0.gfd12fed.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.9.0-202202120107.p0.g43552df.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "product": { "name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "product_id": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202141138.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.9.0-202202120107.p0.g9fd6103.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "product": { "name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "product_id": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "product_id": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.9.0-202202120107.p0.gecd60f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.9.0-202202120107.p0.g8b203f9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.9.0-202202161322.p0.gfe6dc77.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.g79857a3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.9.0-202202120107.p0.g56efc78.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.9.0-202202120107.p0.gddbc0e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.9.0-202202120107.p0.ga7442bb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.9.0-202202120107.p0.gfe2a7fd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.9.0-202202120107.p0.g15a6add.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202140924.p0.gce028c9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.9.0-202202120107.p0.gadfdd41.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "product_id": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.9.0-202202120107.p0.gab44f58.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "product_id": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.9.0-202202120107.p0.ge0fa82c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64", "product": { "name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64", "product_id": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202140924.p0.g340e212.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "product_id": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.9.0-202202120107.p0.g0869335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "product_id": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.9.0-202202120107.p0.g9f870bf.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "product": { "name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "product_id": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.9.0-202202120107.p0.g03842e0.assembly.stream" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64" }, "product_reference": "openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le" }, "product_reference": "openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64" }, "product_reference": "openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x" }, "product_reference": "openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64" }, "product_reference": "openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64" }, "product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64" }, "product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64" }, "product_reference": "openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64" }, "product_reference": "openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64" }, "product_reference": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64" }, "product_reference": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64" }, "product_reference": "openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le" }, "product_reference": "openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64" }, "product_reference": "openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x" }, "product_reference": "openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64" }, "product_reference": "openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64" }, "product_reference": "openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le" }, "product_reference": "openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64" }, "product_reference": "openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x" }, "product_reference": "openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64" }, "product_reference": "openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64" }, "product_reference": "openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x" }, "product_reference": "openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le" }, "product_reference": "openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64" }, "product_reference": "openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le" }, "product_reference": "openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x" }, "product_reference": "openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64" }, "product_reference": "openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64" }, "product_reference": "openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x" }, "product_reference": "openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64" }, "product_reference": "openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le" }, "product_reference": "openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64" }, "product_reference": "openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le" }, "product_reference": "openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x" }, "product_reference": "openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64" }, "product_reference": "openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x" }, "product_reference": "openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le" }, "product_reference": "openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64" }, "product_reference": "openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64" }, "product_reference": "openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64" }, "product_reference": "openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x" }, "product_reference": "openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le" }, "product_reference": "openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64" }, "product_reference": "openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le" }, "product_reference": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64" }, "product_reference": "openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64" }, "product_reference": "openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le" }, "product_reference": "openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x" }, "product_reference": "openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64" }, "product_reference": "openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le" }, "product_reference": "openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x" }, "product_reference": "openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le" }, "product_reference": "openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64" }, "product_reference": "openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x" }, "product_reference": "openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64" }, "product_reference": "openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le" }, "product_reference": "openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64" }, "product_reference": "openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64" }, "product_reference": "openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x" }, "product_reference": "openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le" }, "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64" }, "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x" }, "product_reference": "openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64" }, "product_reference": "openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le" }, "product_reference": "openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x" }, "product_reference": "openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le" }, "product_reference": "openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64" }, "product_reference": "openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64" }, "product_reference": "openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le" }, "product_reference": "openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x" }, "product_reference": "openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64" }, "product_reference": "openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x" }, "product_reference": "openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le" }, "product_reference": "openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64" }, "product_reference": "openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x" }, "product_reference": "openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le" }, "product_reference": "openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64" }, "product_reference": "openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x" }, "product_reference": "openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64" }, "product_reference": "openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64" }, "product_reference": "openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le" }, "product_reference": "openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x" }, "product_reference": "openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64" }, "product_reference": "openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le" }, "product_reference": "openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64" }, "product_reference": "openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64" }, "product_reference": "openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64" }, "product_reference": "openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le" }, "product_reference": "openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x" }, "product_reference": "openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64" }, "product_reference": "openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x" }, "product_reference": "openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le" }, "product_reference": "openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64" }, "product_reference": "openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64" }, "product_reference": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64" }, "product_reference": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64" }, "product_reference": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64" }, "product_reference": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-23T12:57:44+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0561" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-23T12:57:44+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0561" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2b7877893bb8d477c0a2494f9ea74b8724d6db44ccac6a2a20162664d8832d3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:2bb8e283b651ea9b3dd647011571a11bd1fa9f56fbe6dc9d45ddac16f082f9f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:40c70469c7fcd819149438e3d7900f292d45def7655d4a5264315deef621891a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:83b9adeb47553e8967de2273a7f5209b18973dffa4943b1c31a3b23f8ae4ddaf_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1bd6e6da1c081e0abc230e818b205ea217134a5cde454a454d9dba1670f9caa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:1c6f4928945cc6586c50675c25af837511c3b9bd95029b16bfdf7b9268fca36f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:6a4bb123a5ec84e77cc498db6740325fd72c4e2b4b26e3ea5026f677c56211b5_amd64", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router@sha256:861d663186511d415b027b36a196bf6a89cca26625d355ff37e329c422b7d0fd_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:5c3ecc29b77c9425345f9ea56377185d405854b3eef430fb22289d840340d469_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:7941a621b86497ee52f9fa147f656518aa7267139434444fa1256b5ad3c22b17_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:99d7cac401870d9cbc6f894a4a3c9f366cb62a5e1037d4ef60583e54d6519e73_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:fb7d9b4e2c9c1b14a3c8be479a2bb2cd3ebcb5e52297f8c628ab844563a85ed0_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c3dd0414e29ff7892dc2a4bf9b920b3948c935823bf3f3f77a4af516a220b16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:168339d7eb762515364404fb92788227d142e6cfa79e1c3708064bba65edb89c_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:1f11d7c78bf033ec8e9763dbc95979173d935c994fca68f8a13d1caa91e29d42_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:5ce1772398021c5b242f44832369dbb88b325248f1741afbfdfd9158122d50ad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:494933670cc606a1a21c2e883a2f859f28ca42bf8cfb0ef04baf8a770fa3a3f6_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:c279141a0923274c5be2b1a6e78e31ae493eb3f8f5be9561524de6d91b57d60d_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:cbe96dc78fd36a95a1712cc22a60a2d69608b193622cdbb18c80accd9ee0e53b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:d229e6f642ae90118cf1ded717640e65b70fb65287a0bda147d2cf92e39fb8ee_arm64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8@sha256:0e4ef22d135826b18ef4d8f40fd07ba11902d6424b4f1f9e8bde5cda2ff0a953_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:4cf2d7b90f7ea66070135a785ad2706d33a876ae71a1e4a4704a5f343d3a602a_amd64", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:913e40e004054998643f88fe439467afd0595e6a8a8e7226f48a4229b298b222_s390x", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:c1cf66172f6b7f702d3bd818982a4cdb535f51392d7d49768c36deeb64841fdb_ppc64le", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8@sha256:de74f4ccf896fd95af4e48b51ff51959d693177389937f3fdc8630833cf5117e_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:3c73a76fdca849b2af8a857d2c6000d7cc756058998c726575847874b0aea2ec_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:6fcdd672f1689067880659b08c7b4dbf2162c4e07ad3159dea32bd1912eeb75a_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:bba80e449aa4d4a751dbc371671c900ab7d899b65ad92f174ac45d5b167a908c_s390x", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:de923276bcf68a7c6b895550cbb6740e6585446af95edacee26f3b495b957357_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:7296da92be2b4035bc9d451788f6163e5502107e23c011a4565c6313373cd53e_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:92164fcf86ec4e09d7054ad19ade984074228023d9d4ec0c61d41df17c176025_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:8dd696c9b347246805c439c8ddbaff245671e4c1ce59fb64d454d80b9fb75816_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:a2f0c48496943b673bfe514624dfe327a713647cc5871459388c118b26eb610d_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6af40f9916998ef217e7ffa4fcc021d8f1b8075e509cdbbf63c605b0cf40864d_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:a152f891b5dbe3ba6aebbe36854845e4c921d416bc06f8df7e7daad33659cf96_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:09d9dd357071ee13fac3dd89c73824e611df230cec936413a5bcbd32a647d161_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers@sha256:9052d7699163eeb46987f724dbbf76c4d23c709ba829e9d1fbff6b7a4b7ca6be_amd64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2fb0306d8484c6599dcf6a95064930891cf11993344ce25aae27b6075dc0077b_arm64", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:f08b4392b535328106b7e9990a31e6ed899de9e6a91687e3ac9caf4994809700_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:2983c754e5e7bd459cdd9a28a8bbdcf23b9fabe7cd43251cb10027c5af87e15c_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:a6340338239d754cfed012bfe21b648bc9d21dd6f475ea861a7ed9d926084a04_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:f074441638c33bb5778a1693c5fc929409d1424cefc1b5b42dc41e0eca7f541f_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:d5506ea5aef60e29bcdfdb642077537858de8b3e78ff82536d648af3ba197b43_amd64", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers@sha256:d61be5aad9b9ec13eed42fbe43bffe2f241de4ab1a0461ba9b052a8b409b9ceb_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:0875c6cec785b376ff4f41cfbefd64583c46106c73b598c530202d6b8d52e882_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:8bba3d05e7527d87d8724cf91540d7f135b648edd6fa9e205159e1b7a2898d28_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e04f696a4e9a94d2438dd0b4a873e4113028e70221b95efaaae77b2b29e8297a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:e15eeba418af763462a9c60d32c380258f79f05624687a3ade0da7fbc3245e01_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:3ee35691747337b61fbdadf76502b1b6ebcecd9d247d63d208d7f9b889c281fa_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:436bd935b189485f131fb5ec3fc5b31bdf384d4882fdb8412937f24726e44269_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:794ae7dba27e81f8bc5bfb8d4e7aca497a2346a46de1fedd465b62813cff99b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers@sha256:8f779c2203f6371ad622b36df75c6546e2156e4e007d9f2ef37c088d701c29ed_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:9e3d345e9b71be31cc496cb4fd7762bb5cc01aa2d35f0c241f17aa8b37d76c0f_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:af190cb66fc47b39ab1e089bc5c5f606846dea2ca0cd64c6e3d3d79ae27e7acf_arm64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:bc0f130a7a1d39c3b976a17f1b558395c30b79df02b62fb47bb08b383ccece06_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator@sha256:d34c0b475d44114ee184c2cf615cb5a3767d1265072c8a0811863cd5692fdc92_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:3256dfdd7e5a81d46f1e56a6e7878c6c09e78657327ca2b2bcdd183c54250caf_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:5afc2ea84ef6f32a364c2085be656d77d26715563b24f0d93f6586a21f2cf985_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:db38e27fe27cced9959038221b4c092cd0ffc5e952319cfab7b6ecda2d8b393a_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e89ae907d7652dfe999dcdccc88e35c7006088d611d384714ae271682761e486_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:6c0d1fd9352d9225e01091ef8ce00eb730e80847d6117c2a934965e5932f271e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:c26ca1cf5a6744b1b5dda5e49d54d059dda876fcd89926af441c2f8bfc1069ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:ddbaa768635d400cf327185804a5d2255635d562e2b7b4e3beaa141cf739a579_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:0b440219913357e447eb3a575ea2380cf8584f9cd2e4408f18dc208a06cfd1a6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:2cfbaa503693f62e24ce9d8e8277d531f3b954f5a0baaaf2a8ccb2fbd1188253_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:ccbb46602481acd8c30cae0b8d1a136ae451705411f850d02d90cff2236b779c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:0131e36b89addab5050384c7872564014cc745e18b62724e0882fcde80c565f4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d37146519e15c58dafaf1e51c8765e24f7ef802f7dde3a086d5f2004e376d25b_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:d8c0b75dc62c354096b7e858764e6bd1b8ea4fd5ccbdda89684f9caa8f81787b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:eec72f4cc4899951b9d3402cf2afefd529908019988cfa8f562797abeb9ae47c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:297a910f25cd2e896ae13e4653ad24edd837c906cef3c1fe571a05eb2102b2d9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:66797b19f56815479806b24fd558fb61f5c5da6682ae153648c72debd149aae3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:70fcddf52bbbc6a9d16581b027ddb238263edea42e2d5fe25f65b4a2da115819_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:968b26e6fb1b2f8df2535b58f68560de15bf85fc9b65f110e4cbe008d8adce81_arm64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:17880978c3ea4a4c5692c752f206c5e7a9c4db749855a4c42343d86b52920a42_s390x", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:40214ec88b95f5d8e9f249dfebdb7efc97c5234d1c7298b485b86420b95ac78b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:80164344b527ddb32b5c09f2a4a7916050f91478a07eebd81d8d5d739d5118d4_amd64", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator@sha256:ed2cd43aac899c6689f69414bb2c4455719d0ca4f4d399e451497b1db07407fd_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:0cb473754d2daa03a3c6f53aae10351296827d0af9bdf01ff4b366b1bf6c7567_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:1d9ead2081e990fdde2e6dac58f71073297102809ba7d2584bc7701cbd8e2991_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:80b05b9418830cea49538d7958230023a06b5644a00cf07b05e5d86c0817030d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator@sha256:ff709d98d118eb014a0b6f057bc735ff4d041b1ec104c4b68ac267373dfa5299_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:1e35d6c4c31376d6be761e469c15cea5bd607f78cd73c76634b5dc61b53de8d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:379cb02d75d99d193c30c935d4b5c6274fb26f614b6e9d6fec26290ad0e33bf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:720a3cfe363f21ebe0f59ba4b514e8bb1519f46e90b321a0e4de12ec74a25cdf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator@sha256:93fd26eb3fe1e0223d3e9d28076d84604ee16c7ee4d0867ead1952e84ae233d6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:45bff3d6f0ff53703585fbb179d0fafe88f5594df373a6c70cd498f815c7a7e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:5a75994634f4303fb1e002ff2af288963eefd8a1a89e9d3bc237e1eb41a10f71_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:98e996456b973173cfb3f07e0c90fae81f3d006cd06d8040ade0208342e593ce_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler@sha256:beb8accda973116e29ab1ea610f2307e8a5bdceed1fb56cb9b9ee74343fe13d2_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:1471ab49a000802b514d1ec20a49ee9ba344d18f839235a664d1b29a612edef8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5bbf76a2fa357abf6ed3d1025f51bd8e7ee89b55bd658695d1e4efe9886ecc5d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:af1e56a009a29787af1946a2106c63ca9d20e1a60e2a443cdb3583a3a2539348_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:be066a5f1e88a4ce7496b1cac284c1d0264d55fa4d6bbec6d39f9e23f3c7f6c5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:237ef826b231fe14aab76960de7d020d1f58c3d2d519831b9a5ca2f6847eaf4b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:373038c7bb559877d922a1e6e46e6b4c9453556ee52edf6b6e038f6ee247db9f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:561e669694c3ddc94f83d4c24b4e3787728ca60ab4e256e20b98dde5995c6452_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap@sha256:e56a595a00183c678790e434438745e6d950b431029c578a2743b432e0637fa8_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:8136f1ef9ed88894476dd93a824fe07fdf3896082fae19bf2f1d83f6675957bc_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:a69f523e7a416293081337c6a9243cf700ec41017d9e6c9ee544418143839ece_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e434fcb29a8409c3178fe145aba6ad2ff9f9e4779093da89727fd7e21b7858e8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e844428977689df40829f321e011f670619a088fcd9b4c23bf52046053fe0df4_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:5dae9ad3f93a01a9a1b27880084345dc89dd1d6996b9a781316f8afe3e2bcbbf_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:ce4a62d890d72604c4be91cd51761d4b51d4f3cdd32da052d8007dc5bc3b7895_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:e1031acf0db3a539c673574eaaefa652aa41a09a95cb3eb77402a914ff4141d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator@sha256:fd3ac00fa8c4f7e649da14cc44a1d66d0105f72d7217a2cfe67646311c451617_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:65f88e8a7f4c35b130a305588c86528e21493120c0f5fbae6dbf33626909a3c3_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:aeab1d34a967742daace61a2e43de946b0c215710f0174f2d309ea2922b8a597_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:dff0817bd84e457014c5ff18a23dc013d527c435aaf455ecf55579e364b1c2cc_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:ea318a9e1f7c6b99d72e9fd3428d0f83f8c1711bc8425d5572cb876028de4b88_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:2016eca41834894db1d188c0ca7a6453eb98773cb9cd66b3bcea2a23659d5849_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:34bab1a7e5a214bcec7e6f7a931b503233d70ef376ed3a682f6d89bd9de3002c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:4934cd0453735ee1fb0ce67d712c64b2730d432cc8e4e96e5ec48a0bca5fc0cf_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator@sha256:61fd615bf95e1e465da79f1f9c507797a0b7175753b26eccf8cd3a4755cbe3e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:0d47eedcaf0d19a37f0b1cd0d97a3f8dd87a1b5fb2e053356e614011015a56b2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:c64049e7f9c6e44c4716c73796141910fc5d0532b5543dde4bdbe8c2cf840f09_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:ccadcf8b071ec70a665a29580907dea1d07576d0e727dc4265388db247ea26e1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator@sha256:fd05814779e17c21e8b9eb1556c55424ff069fff05eacf9588f1d77e1e02223a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:420325061c6ac734557693df24fc8aecdbcd6afe34f39db38c04549fbb179ee8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:4751332c9a4d93c25693e17eb3acf64e9d867eeed9df1b7f42107f30f7dcce63_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:aa3e775bb5640531d3e6a7a3cf8e1802bfa2ebec905554a94847f81d51010498_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator@sha256:cfbef68f5d7f893dd1d21c8b207b6ac02a78620dfabc7d4ec23da67aae83e052_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:31220bd57b10cbaac6b8be17e2e66409d079c6357ac10591de7d1b4f5b06fe51_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:47038e7a49324eab53cce61218698d2ce1918209201a56ded9542e9ef6a721b1_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:749af0b14738697e19a8d04445244ff66fa00a4366192c7df551131b3945e27a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator@sha256:f3e98cf41c42043de623e164e8e8d9ce3f581e39318431e0c8670fc56443e49e_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:06902240114f52cc6a4937655c7a78312ac46ae6fd0e59b641f9b08d382a6952_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:8a1c364f4a80006858c7ac2476d8d5f7d71385198d48cc7fae7c4c1e0a0d2a12_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a0049258a85fe3552e073277310b156b3f7d743534cc7b15d4bb6d400b4404d6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator@sha256:a3703612c03564efec27352022bd3e0361c9b3eb9fdd5c6e7b438581f36ea2de_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:1b4104251f9d8e89f5809e37d750789dcdcac2198b4727d6d157707cb1673051_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:2928ffbd8f105ffdd10f34bb8be3b633bcaa09f80cf66de83e7a1453b557fa0b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c9ac0a947d393fc10610767fd068ead54b3a586cd44d87d78b8757077470116c_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator@sha256:f6da53ee01de767e119d34bf3a09d170b33da9aa92b07dd0cadb26253b1a7e80_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:3cc540534af7cbe11b4020c3bea0bd96a8028d9b02138eb7d7b04c7d1e78d2e6_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:90f844a17acac238917fa6c5f5a0de64f3a88c58b6382b3a673d8bf218c8e205_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:b66b49070125dc71cf43dc4a991a40e40b904c28a2b1d42f95d268b71996b1e9_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator@sha256:e9f6beacca4f8de6f6a19fa06f4ef494eb1eb7d97b1a132fc89978ba6857d1b0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:1c19fbf5654337d637dab267632056018941389bca1ade9c3fcb26b1d74f9330_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:35c28717c0773574a44c8fba7f1b361114c4fef85cde3e7e941db6ed6f89bc20_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a35e5f3af9c7317e62fd7b0224f65d6b06889bb43433ffc77799d77119f61d1f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:af02bf25fe6d3d24ca586e9390ed9710e74c9da95a9e3da303b158fe83944ced_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:0a850a36ecfbb054b0c0933aa02e952cb5bcf74bc3c54afc5c6d9554bd73209e_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:40da4ad760b4270a7d9d62f6fc17c82cee989e0174ab09445661e0bfdeaeb698_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:6cfcf192c7ba19e5a50792f34abdf194f9f62638cca42a60d7e7e77c9e446898_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver@sha256:cab50959555b1eb7bd8e4335000c62096d1d7ca9171c9713ad7664c7c89f181a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:12bc986dca05fbc6e05c13e233c79ec044c3282fa017853b1c6b656260df1c3a_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1738685943369b1d1bb0bc1a9a3226e723599e66ee99a4be5aaccfe1ee909bb3_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:62c6109ca82cc0f2a97bdc48a45e975e69214a47cda26f5821dc90c0fd96fb3f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:d065d84ba40701bff768cdfcbd5ef7bfe34c4698fc91f77a79bb9a842dd30155_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:20fa42c98db6274916a2bd1946e26ddcc0ca0f9d97ef56a7664e2542c3080fb8_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:86307ca1926c0800a4eae52a34bbaadbcc8f6b3834b2803671790f5c0110b0b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:a93ce4f66afa57ebef03c4d6697e23976bafef997fe12d1154245c00e5098e7d_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator@sha256:fdcfb7e5a2bb59c5ea44fe5bfd1b8a17fac76128ecfc74120b61eee1e90250e7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:03f0fcab57002fbf682e493615f1f08f2bb0985b6e48b5a78dd69e59cecd0351_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:2ce0d82e250fb7dd96aab6cd61d9dccfe81b8631f56c0c16a9b1cf5e0fc8b926_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:42fbd24f57598e9c4d820cd81ddc88d3241b85a375f08ec7a606ea35de56176a_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator@sha256:96ac6d7e115b2b61fd126baf87794e90c3e8b59ad14c30359a50809c89662776_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:51f6421a9b6c60fd282ba8311c4b84174a936dea4891243e5809ae1bf4cca133_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:5bb74e54f8e5b6df45a44394a8b1bdf1cd1f787d23e94a2f9719e61b492945f6_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:8177405a20c334b87537bba1ee54bb1f802cb86baebc77360ded693541072816_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator@sha256:dd208b9fddcbe685a018c21bdfffd8da69496ab3eaea2a799470b12e0010138d_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:52adb2fee4444277fa67dbbffa61d6d06f93f9d48f2eaa34758728bf2d6149f2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:80adb76f7af54717cbf7da95fd6a0e756d34c491511f3fe2df94937345e44d48_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a7c9d39d7f006266c006fed421dddd058913df3e215b9e54bd6fcf031c40c673_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:c426df3debe62afc088a836c05ec6f74063493d9724c493b37b2ab2c8703a5e9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:3bb8bfee264db827f61948dfc84c5d08e508ee88594b555849f6908a2c06e6f4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:5b10720e57da99d2b55eff7b5f0b4491da94558b05c7283ed323c102ec38b3be_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:6dde935046a935f0db3ece8482aabe57360110f8af74e9f4db8f3350ff33be7b_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8@sha256:ca87300c0f309ff076e7335bd756f90ccf4f3ffc5e9243a4fb0b36d4a8cd1a7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:3d903afb4eda7866bbbdc1132846423802929e8316768dad9951051d015902e9_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:b759ace52bbad51c72763d4fa4c1c3515abb7cbabed7c4395ccd12accb0410d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:bb1b258a4cfca5f07d2cb78a040aa16289c98886068861259d9de0496f297a99_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator@sha256:f42c4efb184df5b767a653b3094a73fca312391566512c5aa5f5b93534bbb88f_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:79ea76ea01485b6b4d0ce430205171e9c3c34b4a30ce7805149d4b717968d948_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:83ba62c1bb2ce1904a96c299d7a82b8b1f907579d3a13506bfab6b3bc4047791_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:842d7f57ac2820aa123ec26011f16a8c11f9c588839499029f1a66e53ea67776_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator@sha256:dbcccc58c0a20e4486971ed501d43a3a8545a8eb3699960cf845a8530b4996b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:0f3c90d0588af9ef6d2c4b91204002a493abf7d6e822d74761a7179ffc6da6b5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:4595c33aef69dd76dc775037fa6c688bbd5b7cfe70df9be677b71ecfddcaab00_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:5c91560371860052f49dfd35b3499c9ae1cbb4d63a835f6b7fba6fe39846f24b_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator@sha256:b360e9bb8f8f72f77aaec10a3c74ab58fcdc4fa18621532e1e9e112fbd2b6cfc_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:2aa072198cff4b43148d055cb3e99d7a06ef1f03051a9a608eac098c2417e2f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:94d6df3f9440bee459a85ed8809fc33e626e37cb8f60f19ddda47b9b069a8daf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:d5be9e4bb2f3eb7ad31e41454937c8ab13dae75a3c133fc9daf8f11a0a8dd2ad_arm64", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader@sha256:ffffcdb4b2ddc0b711149fa8430a2469f8f8ce2f818d62d3152dc9a0641a116a_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:4af495ec543d8822b346ea57fc2311491b866277b871e7abb9ea16bb3c3a6aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:c29b38165272d6bd2fbd0313cc2c7c216ceb6a70b955d5cc5c234047fef810f5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:e208a43e561141894c79994be221d9046af2856b30a1bbb08c94d756e1b6347b_amd64", "8Base-RHOSE-4.9:openshift4/ose-console-operator@sha256:ffc720a6f664f622ead562b91d2d6f90d15d78890a7a32362d86585854bf9172_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:2631f9532452d9c78d30532332c921e765d6939705177e95ad4ba31b89d698e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:8bdc79bb0d39bcf41bd9e10c88ece195c87224f520f9f6eced1f48895ae9c30d_amd64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:a93b9aed15e4221a3ec58d5c1ea89262fbe338e0ba662c14bc2010475abbde00_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:cb35c23df1126e9b5146bed506af42c85026451e029d8555bd8de4020128f20a_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8@sha256:387e6bd4339c11e7ef3fad607a5395a0c257bb51f2acc275ee87532d240520ec_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:83e4780d923f4630ec63136118c750631232e3d776f5a60f09ab55ffa9e99631_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ce96ba529e49740e8c5b5ecd421fe5038b9a5901986cd4b64a90e6e2f10c64a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:dd742365e128b2f8fee6325c12abab3de00712a57fd3c81a53053920c709140c_arm64", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8@sha256:ffd8d6ef3d557238703d0d9c58619f837ae11ae008c86ffb55e77ed6682c845a_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:3bc8e10e8b21a9fed4ce9e4c15204b2c3267d0b0d94a788c893cce095742d96f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:7085f67267188bef4f9ba1bba20560b9c280d5628ad2373ea6915599f93be220_s390x", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:930085f66a05e6bcb5b49ec7a87e4799241484fee8b1f019f3ddf0d7f89607f8_arm64", "8Base-RHOSE-4.9:openshift4/ose-coredns@sha256:e5a5e9fcecf851335751553b74d7f67f0e5a276354580678ab84c6a8653f76a9_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:3644af0b966d215497d8f75e94e5e4467d0996df222be1797cb4891ebdd7a764_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:e66e6e64d6d270c6e594fdd35165424b6a271d116f43bb046131cd16c4cd00ff_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:1789d37fafb7c22bfe7cd234c161623d950795465cc8c5c7856abf026272a747_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8@sha256:59c0a4a9036b68551b500a7f245401d98a2c76cfc06edc3c0656b1cb35410348_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:b0c18cbbb8494d3ac597576a21f958717d9da6b609beab957a07cde315c632e5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8@sha256:f1bc616d93d6b9ec548654618e8d00fe4c2c0ab8187ed95ece0a4471428f9760_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:1d9aa75b3527270039a9cf081f44e81540f3e71200f1cb06fbae6e712df2a838_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:95a047dc4bec8a98f7f4ae227d2b1d4337f7823916ecac51b1158088e9ae5aa1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:9ffed943cdc9597803faedfac8891b963e08ec86f4cb21a59ae7c37adc5ce349_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher@sha256:f2d391f0e6fe00695ed1cb9525c9e3a3b0458dea1d23c248e3819677f54a9373_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner-rhel8@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:1d37a2ce47bb1210a4da810c036eb18518c1a5ad16c15a8a41cafc248d77b70c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:597901803cb58c358b4e2eb1727388cc306805dd65856a5f7f43bd0b1c6fdab3_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ea0797b04595d1bf46ca5d3b205cead25c70e8c252e844551944079000a3fbe1_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-provisioner@sha256:ecaff0ff81689a8850732734d4fce6321439c21eb9d7a52469e27a0731d75ab8_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:2f908ea6f0053c450688d2761181f711fa751d9b0bd114d9b1f4505652067e96_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:49ed3001a156015c3acbe5ef058f9acbb471b456535e7d56f6baec742527de74_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:580f0b1ab8f22df541ab9b12f1db0c77bbc010759df749cd6534642bede451b8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer@sha256:6c541954bcb2db98fb96ce1d02c34c7e9b3cbbcfbb5b96893bd7115c21db8d00_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:3ce747b7e19c5d0fa095fdeb29db3c9133575d24d941bad8ef6e71130c3f3883_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:8622bd1f198f8dc1640b5011101b2712b0f45626aceadee03494a2f82d87a9a8_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:abfe102e147d21e27bab1305cb972ab57649b88f7e5f9a5423ce053f72557e42_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter@sha256:ce4665f66022e37d1ffbeecfc57a9492e31b246a0bffe7751ebcad501439fb9b_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe-rhel8@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:5f11cc5bcc9a5de35c9dbb7d9f2fe362b105b730996c6b24f5988fe44bfe31a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:769a54d3321934f94134e435ee3af0191842e5638eeb745a98f37d0e397aec6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:7c9816e9265dcc83af534a61175814e174ec10c1b411e71baf5d379ceeca1ecd_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-livenessprobe@sha256:c6babd79f2090d9e69c28ddb880b6d5924c79bc4549f3e48c90860e78886f36a_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:40c3fe76a68d1ec45f080594911b8b7870a4372831914b17bb4ee0018bd8536e_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:4ca6d4d2f88eb0435084e1e0703330181e69e9c5c205ce21071d30fce864efde_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:70d03f343c194e516566e343598c7964501f10447790487945b9023ca9315d71_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-node-driver-registrar@sha256:fefe8184b66c7f06a97dd7cdb7a5c5ee8ebf2836af2c321cec786ac128302d3b_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:1823477c445de26ea74e827f8cf0180fd02e1e1e0be89070fa5d8ae007f53a73_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:4ffdcf4d84d1cccc635364d0fb128e6c673c20b3a211a5a9119abb69bb8875ae_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:8dc0ecb37fd38db587b4da6fbc99953f65fe86c704db75d83031416298d6a5f0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller@sha256:ef6f2d48abf5676d1fad1ed029569310486d4809d6e7fb866be35486d8c909e1_arm64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:aef7472b0c31c9b4081afb61959537a18d0d75c5f14d8a376a833313aff917f9_s390x", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:cf58e098e5d32014fb975b56f1f9a94b1c766f5759e0ed4cb463e31ce3b5930f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:def413b14f2dcdf09447ae316239607e80753b8c9b392c48e8c93c3e47d747b6_amd64", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e6091a2a908d3257f23ef4dcfdfc1b9482a6c7a9ab9dc003102c0d12f66b3e26_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:30be1c3f13fc79fc67208a99b88fa07213e2bb8f495b37b40dc76f03adc6106a_arm64", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:819a7d1f7c972d557c63bb1b7d243c3cd053a67b4f8238713b773a56335baff7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:9c4e947034a7fc0838ef8417883b5387c491735b5782f3b7a508e89170481608_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-builder@sha256:a3a290c01cab8cd76b43108a16f01a5fafbfd0d9c0ff6aab3929923a465cd2dd_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:72ccb93667cb143a429bac732dbee96ce97e296895d05836192bbdbeae44a71b_s390x", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:8164825962bf8ded2a563b85bd167c040f552072281083f1006c7527b41640d4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:aa4f4d1b01d3774378707ced89b8b73c8e6cffbc66546dc9a30f7ef0e5882555_amd64", "8Base-RHOSE-4.9:openshift4/ose-docker-registry@sha256:f1e1d7c87f80cdffe3d991a9ae6291f92a526c59411d9c1e650082cd6ee9ce27_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:a3f960677bc9d40e501a8ed25a2fa525adc83f064351a0d396e15e84c5cc03fa_arm64", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:bdb80a385246fa9bf9f304b9bd4ea7ea495f8c08746bd3e182c8468726f541fb_s390x", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:da19abe7fec9bcfabbb447cfd5cdfa3f0922bf4e69743a57e6c99d11ea55afda_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-etcd@sha256:e345ddf8d5858ecea620a71b614283f00b8bf46e13261f5c6e7800f151693fab_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:bdd6f9dab63e566d59cf9ddbdaec2db294bb6d7eefe9831fd90324a93549b1b8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8@sha256:f7f9435abbe146ec18ed055d9e7c44b95e61e5a5505cb3a28a88e3062454978d_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:1d2c5d16be3506e38360aae298659fa9d3c7267bf87751c8c10ce41892f2d9fd_amd64", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49ff4d11d9d9877494ff364d9736835a97de1456b190a965b0a054081482ee03_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:b0bc09b8dec3070131edcd79dcba6e3064e541550cd9da30054577f517389e51_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:dcaf55e89e2682eaae55fbce2ecac428e016e52656bd14ca8a89921b777abeb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:40bcfb3bc9d12fc73edc2b4b9352f585c108bf9919cc765297dbc510b865c913_arm64", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:8a90a58edfa2dce602b6212332aec462aaf89baeb0ed65f490a491095c7a99a7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:a033cca41eeec1d2f67a23a5c37dac49309935d2dade0f695750c24ce6aacb24_s390x", "8Base-RHOSE-4.9:openshift4/ose-grafana@sha256:dcf9cfdbb65784b4f579b681fdbfde5d80eaf8f84938e5afbb0339cb735b48bb_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:4b1a933f8ef268c930a0ce7494690bbb252bad0d222ae77f2cea16efd08c5313_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:9c3052ee1110966ca768094ba207215bdd8b14609c335bf6dc545eb20a0c8a0d_amd64", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:d31878cc850b64b83d362e468f5a90f6bfd2da86897088a2a936955e149a2102_s390x", "8Base-RHOSE-4.9:openshift4/ose-hyperkube@sha256:f6ecdfc27fdf7dd971f62d134e6db130c78c9a68e49759e833bceb75d53c9860_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:02bf6fd9ea57c9a952ee648683f1e36614bff91b271dab592828f7d7e475bd81_amd64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:ad81436956956feac4669f1e5c924922446103a8bccc7befb16a4d00a4ebac65_arm64", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:bfd56daa4772137d6a5226fd35c93d41da4f3dc0842d37fd140be8cf43e1e16c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator@sha256:e891228e659d96f243c7fe469220f5ee8a57a21d52e9dcf0e709f1c399a1d045_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6141f1fe80dad81260301e2b71ba83f25a0da3833fa8b442251804f573974b2e_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:6a2db787b39bb2466d7f177a97905a5d11e9c2f63edbd070822a6e72fc8c6585_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:aa543cf821d4bde2332520417b1ed0f49fa52f27dfb34dfff35cb99ca7a1de47_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:c3537a640316863d10437e82225546b4257196e0f96f176d62cbdb5d981f04c3_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:2247f56426c1dea33af923249e4b679c05380a836593c502a92b76df3b6d964b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:25fe8306da9f2bb7196dca23782ff3cab902423791e0d55a2ebef100cfb9c869_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:a8c7707d053c6963481ee98f5a71364d3c09a33f77d4cd8accf9f6bc15d57224_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:b441c7f366158fb655d961abf58145ed8c5ff82229b291591bee0c6c3b6f98f0_s390x", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:123c821b5248e831a96d86bddca150e2fc34cbfe313355b19803b16b67b86718_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:27ac1b1d7dc027b7cf5c9b98e1f9528eec29d008e950d6f83f8e6ff04eebda16_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2d14549b8c96b7fbe71016b6bd005a2fddab2af1ff5978a9544dc1a47d05a9e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:31d7913aaa547ff4a924fe7a383eb83351be34608d83c3c121521bf0227fe55a_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:4cd4eb36a120685f969e220bc1c4572141f8778ba5ab6fba1d3072646069c552_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:b0546040b9b41661e1877103dc74cf5b1fc05c86f318cea7b227f2a537885f33_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:08d6775978c9b658879647ec57a8e0a484aa8c78e878e91dabc7bdd073f7db15_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:14e74630e8098d6d9f623b2469ab843d8cac062a3334f421432b97cf9dcdbe36_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:184de95cfd76f3eed72bdb4908bb73bef8edeb43bded3f0c633d729cc9302462_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:d441f601050c5ed61cbfb232d6520789cdf0ecb79c53f8d3e9b0cfc910188c30_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:0a97230e2f8b408b41aff0736c1c30491d2256c71bbf44e767d799c0ad62b4e4_arm64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:1db62bcf9b5210d5df97707573d30253156dc035ac9879280e90908ee6f9638d_amd64", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:52a7315646821e5346b0bbb739c349768ad185f916bb91c7c83805dbe6e01665_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter@sha256:ed02fb399c6946a0742a6caab032d5765cf8480c956a0d86f03606cebd4b14d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:3f792cc559733d24bc1de4a0fc155d277e335791e6ad99e973b446d080c197ea_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:675ef8e5e41083f59776a87340dc5fb5a885a82f1b4ab61699457823212610e7_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:c89fdd514af959de00a1ded289809fb2269dae2184d062482c7c28b228de558d_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy@sha256:e5b90dd6105a9f51de69a46a32f9c16d04a7916fd42db607641213786f8e5db9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:281970659d38e375b2c99871971f69dc57997a53451c0cf063af4e5ce0a271d8_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:39f9c3fb8d6e2617194b52d2cff1bb20939a7b6c3f993588b995071f01630274_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:60141d1af2e8f2c971af9fb2467cb8a9c1cf02ed602c3636012baad565ce7f5a_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-rbac-proxy@sha256:9b2d16fda5166beb379909bfbb7b49c738137b0b7143de399c7c15dad8f3735d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:35aaffc0fbe7bada13a9c971cb703f29e6caa0b36d55d146b02925e7ebcc1a28_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:36d60bac3f4f4b2edf46105ec0ae2976e9f5a484c3b4ed0d1f01856e01541bd0_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:4e44dc5561195c6a16ca7e70bf23c0ea42383ed934253d101e0c2e4790d5ebc6_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics@sha256:f17aa987a4578af06f558a6172e714bac20cfaaceeb850bb88afde5c077a5434_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:201025cab7436c677b77f4622e113fe982543764b4f6c77fde59bc1021f02cc7_arm64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:355c439416e02e466b38a973fb8042f5a2765db624bde9eebb7fe71fa6699a91_amd64", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:4e1f04efa37a64bae5d14132ed339db6902ca7a7a002e55118bca5ae364db052_s390x", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a3d50294de7626b8e3b5953366843a70640a600d6e61f04b595fc80b8c290e27_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:5b1fce83b862acdeeec7fdc1bcdc759499f4c8dbdcd7c8de61a8ce0eebf425a2_amd64", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8@sha256:96e83a528c992ec2f861c2d11a1baf584bb16a9050a19937a56c56b7593237ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:2fe9c7002560488540d34a6fb086d3f45c914bfe7c08fe7aba72bfdede362288_amd64", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:3edaca72a3efbacff349470c79360b8964d558ebdbf8c68be8638314d6f29cb3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:e5b3490f55d97f50483bb323ce6b7db122dc55d7b6e78191870c13ff5cd58e97_s390x", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers@sha256:f94024c67df27fd647e1051ddcd6ea5f2d1c84cf06cdebed09b397809e92a95e_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:68e55c9317a93be199dfdfd170ea5a45c2d0c9e847f422a73a4cf9a9ecb2e61f_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:9cf5a14e348615b435191e7085b0c20ec0c8453e16e51cc1ff962ffefbb8804d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:a8aaeb52d86c5378b5d6a7eb3d1fce913278b10a916b9ba3a3126378d66542f7_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator@sha256:c5683f8a3bafca96a3545b1aebd7b04c452d77ccb4c2415fe28667366f62e2d5_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:04b73ff67ea69b2e58113933c2c9af673c71b546272d35da6e3a3fbe77547532_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:3547bae79466f09971aff6b0e30d7c5cd52b7eb60b6377be85abcbaa944479a1_amd64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8956a1963295a1c7b82292bd6408675524ac466fe5ae4b66ed0319036d15dc9c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d3b12aa52066201a767c7884dd16a732778ce7fb589ef6330e23924b5a123189_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:16df456870a4d0c8161f9c4add393ee9a93689facdeb0b298a768eb8d9ca658b_s390x", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:1caddbff20698e119abdabe7899ff6daf87b5138bf6135f3f503e36b7bab14a0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:245c0439976103007886847fd5483b7cca2c02b28a8a367b1398fb9664a67196_arm64", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8@sha256:fc1e027efddf7429ea2244f78a13e18249eadf3dfbaaea2d97ed01d87ef5e6c9_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:0c9825c6e12b269c785e729e4fc3b2f0dcc47d01b0bb7a01e53dd398c957907f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:85c8a8cbbd7e2c83c95f4002832a56da84894a2713805cebf379b29ddd3a1073_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:8b4828b83b81ef03725a83db285217bd97738c0bfed8fbf62602d661245caf63_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller@sha256:d49ab469cb1122fbde6b84e751725ca5ddc07ee7efa249a215e0240898f451ce_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8@sha256:1a451dda9922c5d0b248439525e6b473421f813b3d2fcd8beafb1e972cd2148d_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:18b9ce07f8d5c93e3ad2142ce85712b7f873bfd8bf6dcb2f93724dc901b756cd_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:39536d070de1e3d0dde66f77a03d63b615499cbb15e30ca0c3acfbbaddad49cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:e471e01cb28f14b881cae04d2e962044609c645a01f6f13a3c3a614644127843_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-cni@sha256:f9529d348569a3b16c8800b4c437bd38b9e6a532a945d29c4259f0de73c5c5f4_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:211ae2803fe35739208d41e69075e2698abf48ec860769647487eb8a6d502960_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:9c6ca6f1cd469bccfd3cc8296951cc7ea89e97ef32e700fae7fcaa5a49c46474_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:a194edd035fce5e025ecbeb03f6594a520d8a57457fce2421cbf39860be8776f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8@sha256:da3f0991701c0e0d44f1f21bde8d358035fc2967f7ed5345aa02f805910f6694_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:3097a036b12d902b864573886d6353e4234a25d24288c52bc7e28f15d8960705_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:16a191ea7dd251cd69994eb2b79c4e09a44d6bb71bba449fefcc2068a2ce792a_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2e72744d68138c1a31dcdfb66a7cb3c592639a557f24cdcc8da89294c878ea1c_s390x", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:2ea650cbd5349267f834542b9260ada1f5b942c2632f8b406b5a1f76e46523cf_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8@sha256:e8b1a79e609d5bd8a25af341075161f38b24e098d0c4ca66452d22ba0c67b087_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:0a22b43fc7350228e762993bbecd9416d5e8aa97b5579c63a66bd9df7965f857_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78afc25103e99fb448c0073ebf23528931e0158ba22bc162c1c694ce6c870479_arm64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8fd679097c364dd9ce223a4e31405ef0da9d74ad372e866eea0d8bddfbd2a30a_amd64", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9a2dc572af3b2897ee5e51b1ce3401466d9fe6e3ba3a05433e871e7d295173e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:d4e7a10b9f1a4626e0a2b500eca249e2548b505b13d93260cef458d5d1f522ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:28751a12f1026f58cbb8b85e911ef62033034e05b40648e8c8bf8eb817779817_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:a825fd0299374f68e29993a00b3cacf10d7f7ff42dc951f8b509ab7ed1f1128b_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d013da876b469042245566b15245a55446280416acc9111d08a919ca316fdab0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:d791b5d05ab5cd1404ee8942eb45383eab6e10bcd0c4dc14eae5081147455763_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:7590119ec6f3018f4c66f5edb0f2ed05f78b69321d1fb3bbcf85843b9cade633_amd64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:9d5a58c5c26f62d2e624b90719d20fc6da39dc8a0a36236b01e053d1f4b7ce63_arm64", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:bac56ee2b94dcfc88ab26ca8aad805def98e5eb3051003c6ad27d89238a90e78_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8@sha256:e9bc0cb1a0bea79ba2b8056f4b2ce1426faecb6067f922a0e1077187c8616a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:1b76db7c2743a225b8e74987c291b5bde92f409a49930210296bc2900c7b003c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:347728317e27ad9416236f25b31610a755e02cc46f20e6f0477d64514b24f794_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:402bc45c8143ba007b80ff8aa1263119bce2ca2436df8a7bfd7ec9686b49387a_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8@sha256:6ede4e2c311182e71ef08fcf333117a8895166c54a6a882c2a0e0c0b37e8e286_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:0d36a8a480244a5239918f74c8eb83972427a7bbcc775b8d2aefb750ffeb80ed_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:60e41b2a08896b426e96991b7463becf09fcc3c3bca5c4c054c71f554f1c5888_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:8e77bd9d4e81b4031620f32f0b5774aad843ee77fca56b555ca0a71f9ff64cd5_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy@sha256:c246f6169d43d7301b48736e6f430f8a955857d8fb322b8cef3c694a50525b90_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:3c8e36dcdfe9b047ee86d4dd17d270a9c67e151caa97b9734f6c56f6b585f379_amd64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:5723755802faa2d1cb0b1d5213608ad0699c5de034be26fb15b3caa4c4fc725a_s390x", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:994b654cb940e1573ae612545bf261ec69bf0ea032a3fcdc1713a4bcebdb4c5c_arm64", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8@sha256:adbbaa3184b046c0457b4069b1c925d80003060bb880250a9d6e1e87bdbc5a34_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:465337437829f097fb11f0c8d5cbcf3cb5bab01dedfed217fa9a318b40ac9154_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:549f09a9e75990adc4f4a91ee0c66c1ff236e8fdfecef93c06d5f28764cd76d9_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:6cebb105a2c0c34044030fdbe5146e01c7fd3607974a86471b60ddc8b7ad1a71_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8@sha256:743434216120417de6a9751fe75908adbd6afa1f939e77502b0670b2fb134cee_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:4a53e9c7725541dda93207a8ade8b2d2aab8e0a23b76bbc278413cb707b1614b_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:76f8f572ca591728a74255e81cc56b497e366335f1236e10db8b9c352dea24e3_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:94b480d7804bd858284a9cabcc43f4d7c9c5f964a68884d2610f89f8080232d3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8@sha256:f18be57e19ce650fccbd74ff1e01825107984fae2b46b61a0464c831a0791d49_s390x", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:2cf3193b634943a8e231d0261231e50e08abae9bbfc01b5e35fd0302e2a32f9c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:6da8713c3fa6ad95c4aa7b7b1b7017756f15016102a45abeb8535e084beaaa28_arm64", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:95930bf473df6b8fe353074d581c8c2f1534652bada5be1475939d63ccd9290e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8@sha256:e32652ddf48137a60e41a9c87f6b32a8cc045dd615cd6d085e8efa5b37fc3f5c_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3de7c14fba5ea827bb1a432f215064b2b312b9df873fb0164b94debe7ac97694_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:5843afc0173f2ad8251b3244c5ed274baf2e009526fc5f7efee7158d89052af7_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:9a137f4f18c7a4c9fe1ac47446bf08cb68745c74c55408ae41ec6822a5882c25_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:a4b728b68cffd3e560d8a6df110c9802886bafad7f2d521c841110b71d449f3c_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:2f4165889754a74d1806718d7496b0d05005263c2646c86de77513e1f40dd788_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:669d0e834f8ae40c9960e4bd9c013f1db5dcd4e2bb68f4e7b8a5e102e9474a8b_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:7a5aa75f6b10bba940a64aec362207864fc88d337e5479fb2ae3c2035c7eee87_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9253ebc479938dceeb3eabd91e4eda7d54cab9950e436ec841249a15527e5fd8_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:320a9cf64add6133ba0cf9424f636f3d511609f504bf2f8ed43096322565cfb0_amd64", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:5a6e37899a11b187d661f7dc43acf7d006114ded7f460aace739a82a81bf372f_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8a506b70e7f6af634ca53ad667f12b4eba485506fd33f7cf4b6d13973a0213a5_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:b43ed3655e585c34bb7fbfef1a38440b375a88e568de9cf5307add85598fce8e_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:7e11ebdcd8f24891cbf570d2cf522b9377cae7abb50c0e60a2a924ab35b1c956_arm64", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:800def8106663f711982ccce888c6f7a3640962632807fee641bc9d5ef9ef9df_s390x", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:b0a5ca4c608879e6c6358505db28a74c11b94b4a386c23483e9c608740c5954f_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers@sha256:df8b968602985abee1eb94110e7053d3e75250798f0a56c10f905b35793f7220_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:95a411d864d199dc787038fd438f6a286a97dfe7ad9ab79ac12f0be103661b50_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:96e9f4ed99597802032db63a363da8b53f0bacb2374b8b96ec179d1d21f0ba44_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f4399658a28a199afcc2223e550961162f663c7b4c842448754b2aa197c99ce3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager@sha256:f934b9627f24e911db67261c5112455630f8dafa235af0cf81b49c87ea04abee_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:8e5d7a59aad19a3c94bdb58aa368e281a2a526567a0d6cd9218ea9cbc902f702_arm64", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:9784d6713cf48253065b7d64b70853644aca121a25d31cb3ebb967d7b19a5369_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:e5369afc765058a04af1b43fe830703f9214dc2eae01749cc35994557b82c4ad_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace@sha256:f8dec4b2dc7c53a60b4f913ec2ec6b2c06ca36bba250822601ce6e9588a769b7_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:0ff55006562402088f146f9415fbae973c2e8a6484ab760adf6fc67faae04cd8_s390x", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:9449938875c8814520ad834124f7819aa641a1fd8ce2af11c7b0dc5057912539_amd64", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:a35315452ea9b80c9f6fb79db437880a043eefb37ea10c096c7db66fdbe0bebb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-operator-registry@sha256:d272964938ceff15d9cc0d28e7376fb7ba28989e67ee56fc15c55a5d9ebe6306_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:46bb42c4a9b9dcbe26baa25bcf2f1d6710dace292ec076793f7dcbebd9473023_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7ff5a3184bf710cf80245bde9b1f5f2b6d09130a5957246d755eb3c3cc795b6a_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:8e26e0cf2fcb1371cb12f6eaccea478cfacff19f1744a365201a688a53030aa6_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:93b73de1d8cbaba38977dd57b54cd81e1268cd7b62ed06be42f8859cab23863a_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:23b5997fc41dfb49ccb98c12910b2f50dbb9e77db919f9b8632134887b21b379_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:2d694a9b3538fca8e3e3a93d8475f7316ea09b28f9bb42df0cff561dae33af64_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:59e114560d5b83457d6b2d930dbbe7d4d97442cca6faa123a6f0a3554739eec9_s390x", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5b171a110b57c743181c458feb99fb3aae98cb5dac00e930d9592b86137c3054_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:14e66cc7f40e3efba3fd20105ad1f40913d4fd2085ccf04e33cbfeee7127c1b5_s390x", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:706d90f692263f9e1b8512058ddebdc91e86ab3046a1fdec27032d9c35cc1dbe_arm64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:8df44aaa5cbc22bd0ef75ba1211c692735aa193b256e8645f74b69dacbe64cc9_amd64", "8Base-RHOSE-4.9:openshift4/ose-pod@sha256:c4d0b629ba82258544745fc92fba7165da84ee36ea1e19787ae1a48f87e0a5b9_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:0bd9e84d5b746840835f1abf414ee279b42fef674c2fcd68c5e7ff8fea227ed2_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:322b5f8380c78b46ce5a2e3a3e8753742c732c47759582d8339897ac3f225d47_s390x", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:889450641aaf06d074b9b0c8891c9df3fba519c613e9e56015bd6b0e6522b6d5_arm64", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy@sha256:f923ac4900b909732f133d283a2adae82e4fe5220dd15ac6b529403c445d3b77_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:3665ec23e207e5f988cd07685db31836812536b524abb10a30133e4caf7e17a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:7d4e7e80735ab91d945073db3415f5e9057fb3824c1332913860ab2822aa4616_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:94d42372380f2db6b64736093888bb0f6279bb4f715b43e5670d3ac7b62c8c7b_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager@sha256:abe7c5c09c132a5054b239dfb0529cede413a053982daca04d75f575407fb8e5_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:66f9f822e6f275f3c0a1b406e99cc739cfd84deff7023e5bc91edfe74fce0d45_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:6bcfae306176961c3eaad3f0f4846b87629d705d78f761a0588caa85a08c21df_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:add13caf5ba9520356bb8acdc6ee9d362a61346fb50cd8920ce7b8985e31728c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader@sha256:f47780f258c36d9bb40b5763d5e98948cbd114ec851147568522187b01a1145e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:31525f31f467aca17f33178d2711bb56a569c436c74206fdc50727e8dc6a1595_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:806c988957f71e738f99f6048a93472418391b996e7f492473aa896d5b2da563_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:c10787a50cf9c3b6f422824635b0746535369b2a159459dee912aac0ede54fad_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter@sha256:e62b4cb07785be7a9a00ceff4096b0f11d32787542a421eb13f5e72718b979a4_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:1d2ead2ecd3c462b20523d5fdaaf904b2c54be69ecf31ad9ca4b9875c49b5d6b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:9f0716667a7fa8c0a06279fd1e2f7b51264e898c0501f01b809d7346b489cac1_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:a6b5076ec736dcf51c3310fc2b561beb0ca5db95ccde11f71a229244eafaa5cb_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator@sha256:b3b2e39d71efb0e62d6748682cea8d3c1e85755843cfe729a11c3ae3c010be3a_arm64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:2bc82040993e88adfa71630fa6b9744dc01cf9167febcb435b9e5b8c0a5ef98c_s390x", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:32e1131db64c410e62102c3c45913719ef68120f8035e466ede4dc216f091300_amd64", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:b17a54514c75e1cf0a8c418c6eb6fc3996568f72000338cb344b09ea1fd6b6ff_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-prometheus@sha256:c66d8563c91db9d9c30b9c884be4521b5cd5bbf381b012628a81c6942b4295e5_arm64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:382ac7477b4e33dca3c0ba06be740ba000d5ff02e270c2403e879a63daf13cca_amd64", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:5244cf8a9d64da4dfd173d43c2116c391b9bf61eeda2d679b650974bd28c1a85_s390x", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:9ebd4ef173dca79519b59bfe8d9d9cdcf1a408a0cce7993063b9afe4a3a99492_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8@sha256:ac965ab6fc8d0ba83c43c70229ee3967b43c0350b6c8445d55fecfdb212fa336_arm64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:0ad08121b0ac512f9b9f9c7219835a269012a851810ee33b2703503ae28c181b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:7300c66f414fb0393d66e45129033c6b0b5e3e48d7c43f1ed8127f18a82c19c2_amd64", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:a7a38cfbfd4c5207227a279f6baae19fc48b20b0aa5df52ee755f69582752688_s390x", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator@sha256:d33dd804f85f5784ef37375c2706e746a168f59188a5291c06133bd90403ce6a_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:407476e09a5a6f669ce05544fdac76ae456e35314c54c6edd975b49d54e3ca21_arm64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:5addfc6909d3c950c175f3cc4dfaa73f68e144503bb4184009f209d4d16be224_amd64", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:b97061168ccc9c31a5f0e8dac38a7ac2346e04b0a15f8c2e142b67963952b0e4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-telemeter@sha256:dfb09bfb8d82e9dc3ce54c8853549ee44542040a8ab3c6e47b2fd4d692027e9a_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:024d0442fe9ffb07ffb94f7377b79118531bb18fa170d3ce8d933bd80b6e35fe_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:0c73d4d9618aae773b0362e89497000c57a055319ae676df14336192e4ad42e5_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:c4451354a7f143bb63e8df98d8e77c20ae0b83d299c0b8ce7eec4f55b6062168_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:fb9c0cd459462bee5841a7d1c5e9f9937a0647cff46ba01762ec59c4e5f971b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:09308500f7a200709f97f66fcfefb58510664d25dfd0036220e412e694231b1e_amd64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:9924a0a689561dd5f0bde2b9a58999fedd6d353df022e2fafaa96c01b9fe2670_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:b6e217e4b0b8fd8225bf01f630d3108a75a5f4b1615ada935dd8ac49025a1d85_arm64", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8@sha256:bef793ceee7a49ad979418f9f7ba0cfabd9d206ae0ca0f54e87019c508d15803_s390x", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:a08c146b8447cc546a01530d65040073b2857fb0baef4d32948f80dd21ba5768_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8@sha256:3ca5ff3324f5cdd63df654774d32a5904cb749da144bc4d0a2d7f4f849f59a99_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:34c6dc8661e9cee59325668d1be198e2d8dc639b502221a47c09b90bcb53cc35_amd64", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8@sha256:d8225953fcdb10e74edfe70e738889f704c5dd0911813655e78bb8ce363c70e6_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:2b4e3632e4d379fc1831407a582426db93092ebbafaeb2191d7ed8249faa9cb0_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:34ebdca1a9e7d5da6996ff4029c77157e0c6e6dd24ac300683290455e2b83ae3_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bcd88ec718883ab0e58e427fb5c74bbf1694a98fb1b66f3c4abc9fc47aaabd20_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator@sha256:bed6298e9a3f82243f311212778cd2f8a5390b13ccaa1375f19796d28bf55c52_ppc64le", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:15bd6b468a54ff11ce1d20fd020cdc310a450dca48c858f81346986bb1e70be5_s390x", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:468cffeba2fa3695a700f6c84c70ba1243525f1e32d1081fd5ebf5e6d8982340_amd64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:4d2795a005a1aa4662a97f141e2e6b562658da06bf30218ab936488ee946b580_arm64", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8@sha256:bdb85fd18fb75c9a8020456fb8482c982c3462e6ccef494c90fc041a7274b334_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2022_0237
Vulnerability from csaf_redhat
Published
2022-01-24 13:53
Modified
2024-11-06 00:22
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.2
(Train).
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration
Security Fix(es):
* net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.2\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0237", "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0237.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update", "tracking": { "current_release_date": "2024-11-06T00:22:15+00:00", "generator": { "date": "2024-11-06T00:22:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0237", "initial_release_date": "2022-01-24T13:53:27+00:00", "revision_history": [ { "date": "2022-01-24T13:53:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-24T13:53:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:22:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-7.el8ost.src", "product": { "name": "etcd-0:3.3.23-7.el8ost.src", "product_id": "etcd-0:3.3.23-7.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-7.el8ost.x86_64", "product": { "name": "etcd-0:3.3.23-7.el8ost.x86_64", "product_id": "etcd-0:3.3.23-7.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "product_id": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-7.el8ost.ppc64le", "product": { "name": "etcd-0:3.3.23-7.el8ost.ppc64le", "product_id": "etcd-0:3.3.23-7.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le" }, "product_reference": "etcd-0:3.3.23-7.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-7.el8ost.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src" }, "product_reference": "etcd-0:3.3.23-7.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64" }, "product_reference": "etcd-0:3.3.23-7.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-24T13:53:27+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-24T13:53:27+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-24T13:53:27+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.2:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http: limit growth of header canonicalization cache" } ] }
rhsa-2022_0431
Vulnerability from csaf_redhat
Published
2022-02-03 15:13
Modified
2024-11-06 00:25
Summary
Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.68 security and enhancement update
Notes
Topic
Updated images are now available for Red Hat Advanced Cluster Security for
Kubernetes (RHACS). The updated image includes a bug fixes, security patches and new feature enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
New features
1. Vulnerability triage workflows - RHACS 3.68 includes the ability to triage vulnerabilities in a variety of ways to support your vulnerability management process. See Managing vulnerabilities for more information.
2. Report scheduling for vulnerabilities - RHACS 3.68 includes the ability to schedule reports for vulnerabilities helping you to send scheduled communications to key stakeholders to assist in the vulnerability management process. See Reporting vulnerabilities to teams for more information.
3. Use AWS ECR AssumeRoles - AWS AssumeRoles allows you to define roles with specific permissions and then granting users access to those roles. {product-title} 3.68 includes the ability to use AWS ECR AssumeRoles to configure roles and grant various levels of access to users. For more details, see Using assumerole with Amazon ECR.
Important bug fixes
1. Previously, searching for CVE’s with a specific severity did not returned any results. This issue has been fixed.
2. Previously, when configuring the Manage Watches feature, if you added more than 12 images to the watch list, the image list would not display properly. This issue has been fixed.
3. Previously, when the RHACS Operator accessed the central-htpasswd secret, it would create a false positive policy violation for the OpenShift: Advanced Cluster Security Central Admin Secret Accessed default policy. This issue has been fixed.
Security update
1. In earlier versions of RHACS, the write permission for the APIToken resource allowed users to create API tokens for any role, including the admin role. This issue has been fixed.
2. The scanner image has been updated to patch CVE-2021-29923.
* golang: net: incorrect parsing of extraneous zero characters at the
beginning of an IP address octet (CVE-2021-29923)
Important system changes
1. RHACS 3.68 includes updates for the Log4Shell vulnerability detection policy. With this update this policy also detects CVE-2021-45046 and it includes the updated remediation based on the latest guidance by the Apache Logging security team.
2. When you upgrade to RHACS 3.68, roles that include write access on the Images resource will have write permissions for both VulnerabilityManagementRequests and VulnerabilityManagementApprovals resource. Red Hat recommends updating the roles to only include the least amount of resources required for each role.
3. If you have installed RHACS using Helm, this update disabled the cluster configuration options in the {product-title-short} portal. You can continue to use Helm configuration files.
4. RHACS 3.68 sends notifications for every runtime policy violation rather than sending notifications only the first encountered violation. This is the default behavior.
5. Tags of the scanner, scanner-db, and collector images, including the collector-slim variant, are now identical to the main image tag.
6. Red Has changed the image names for collector-slim. -slim is no longer part of the image tag.
7. The roxctl CLI includes a new --image-defaults option for the roxctl helm output and roxctl central generate commands. It allows selecting the default registry from which container images are taken for deploying central and scanner.
8. Red Hat has deprecated the --rhacs option for the roxctl helm output command. Use --rhacs-image-defaults option instead.
9. By default, the roxctl helm output command now uses the images from registry.redhat.io rather than stackrox.io.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images are now available for Red Hat Advanced Cluster Security for\nKubernetes (RHACS). The updated image includes a bug fixes, security patches and new feature enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "New features\n1. Vulnerability triage workflows - RHACS 3.68 includes the ability to triage vulnerabilities in a variety of ways to support your vulnerability management process. See Managing vulnerabilities for more information.\n2. Report scheduling for vulnerabilities - RHACS 3.68 includes the ability to schedule reports for vulnerabilities helping you to send scheduled communications to key stakeholders to assist in the vulnerability management process. See Reporting vulnerabilities to teams for more information.\n3. Use AWS ECR AssumeRoles - AWS AssumeRoles allows you to define roles with specific permissions and then granting users access to those roles. {product-title} 3.68 includes the ability to use AWS ECR AssumeRoles to configure roles and grant various levels of access to users. For more details, see Using assumerole with Amazon ECR.\n\nImportant bug fixes\n\n1. Previously, searching for CVE\u2019s with a specific severity did not returned any results. This issue has been fixed.\n2. Previously, when configuring the Manage Watches feature, if you added more than 12 images to the watch list, the image list would not display properly. This issue has been fixed.\n3. Previously, when the RHACS Operator accessed the central-htpasswd secret, it would create a false positive policy violation for the OpenShift: Advanced Cluster Security Central Admin Secret Accessed default policy. This issue has been fixed.\n\nSecurity update\n\n1. In earlier versions of RHACS, the write permission for the APIToken resource allowed users to create API tokens for any role, including the admin role. This issue has been fixed.\n2. The scanner image has been updated to patch CVE-2021-29923.\n* golang: net: incorrect parsing of extraneous zero characters at the\nbeginning of an IP address octet (CVE-2021-29923)\n\nImportant system changes\n\n1. RHACS 3.68 includes updates for the Log4Shell vulnerability detection policy. With this update this policy also detects CVE-2021-45046 and it includes the updated remediation based on the latest guidance by the Apache Logging security team.\n2. When you upgrade to RHACS 3.68, roles that include write access on the Images resource will have write permissions for both VulnerabilityManagementRequests and VulnerabilityManagementApprovals resource. Red Hat recommends updating the roles to only include the least amount of resources required for each role.\n3. If you have installed RHACS using Helm, this update disabled the cluster configuration options in the {product-title-short} portal. You can continue to use Helm configuration files.\n4. RHACS 3.68 sends notifications for every runtime policy violation rather than sending notifications only the first encountered violation. This is the default behavior. \n5. Tags of the scanner, scanner-db, and collector images, including the collector-slim variant, are now identical to the main image tag. \n6. Red Has changed the image names for collector-slim. -slim is no longer part of the image tag. \n7. The roxctl CLI includes a new --image-defaults option for the roxctl helm output and roxctl central generate commands. It allows selecting the default registry from which container images are taken for deploying central and scanner.\n8. Red Hat has deprecated the --rhacs option for the roxctl helm output command. Use --rhacs-image-defaults option instead.\n9. By default, the roxctl helm output command now uses the images from registry.redhat.io rather than stackrox.io.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0431", "url": "https://access.redhat.com/errata/RHSA-2022:0431" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "ROX-9334", "url": "https://issues.redhat.com/browse/ROX-9334" }, { "category": "external", "summary": "ROX-9362", "url": "https://issues.redhat.com/browse/ROX-9362" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0431.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.68 security and enhancement update", "tracking": { "current_release_date": "2024-11-06T00:25:35+00:00", "generator": { "date": "2024-11-06T00:25:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0431", "initial_release_date": "2022-02-03T15:13:02+00:00", "revision_history": [ { "date": "2022-02-03T15:13:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-03T15:13:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:25:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHACS 3.68 for RHEL 8", "product": { "name": "RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68", "product_identification_helper": { "cpe": "cpe:/a:redhat:advanced_cluster_security:3.68::el8" } } } ], "category": "product_family", "name": "Red Hat Advanced Cluster Security for Kubernetes" }, { "branches": [ { "category": "product_version", "name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64", "product": { "name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64", "product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=3.68.0-6" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64", "product": { "name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64", "product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=3.68.0-2" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64", "product": { "name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64", "product_id": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-docs-rhel8\u0026tag=3.68.0-5" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64", "product": { "name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64", "product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=3.68.0-28" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64", "product": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64", "product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.68.0-8" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64", "product": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64", "product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.68.0-5" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64", "product": { "name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64", "product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=3.68.0-5" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64", "product": { "name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64", "product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=3.68.0-6" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64", "product": { "name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64", "product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=3.68.0-6" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64" }, "product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64" }, "product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64" }, "product_reference": "advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64" }, "product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64" }, "product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64" }, "product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64" }, "product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64" }, "product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64 as a component of RHACS 3.68 for RHEL 8", "product_id": "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64" }, "product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64", "relates_to_product_reference": "8Base-RHACS-3.68" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64" ], "known_not_affected": [ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T15:13:02+00:00", "details": "To take advantage of the new features, bug fixes and security patches issued in 3.68 you are advised to upgrade to patch release 3.68.0.", "product_ids": [ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd11379439dab7e64972824a5bae2e51e7c3d2a2b7e7a193813497709b71ec19_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:3b56c2e9baf6cf5973ecf46e58d5911e124f690d0ecad4c82b8bffd347691a03_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:1c890ec418d66ccf23fc32e5af34aaf12c1276b7268555d1cbe7bb0d07f84755_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:ed3b8893f11372df168da1b222cc12f3dc76e165118737073de5f435659c78e6_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:1178a22943998e0a740d7f89d15244d4b1500376493fb84b652fe1ba998bf1d3_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:8c054f058e80f1218f2b05d45fc876fd6a41bebe138f3eff696d2af6bdff64e2_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:e09753e78c7854cbe976289127a6f150706cf4c959accd557b6dbf50b95edf8b_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:bec259b5478ff5bb220acb11887bc83bef35ac0ebb3f765683556174a159f5ad_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:eca5c5e7bf69bc0d2771f290d7b8157126df0ceccf805cbfc8d48acb678f46e7_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" } ] }
rhsa-2022_0432
Vulnerability from csaf_redhat
Published
2022-02-03 16:10
Modified
2024-11-06 00:25
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.20.0
Notes
Topic
Release of OpenShift Serverless Client kn 1.20.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Serverless Client kn 1.20.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.20.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: Command-line arguments may overwrite global data (CVE-2021-38297)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Client kn 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless Client kn 1.20.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.20.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0432", "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "2024823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024823" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0432.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.20.0", "tracking": { "current_release_date": "2024-11-06T00:25:26+00:00", "generator": { "date": "2024-11-06T00:25:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0432", "initial_release_date": "2022-02-03T16:10:33+00:00", "revision_history": [ { "date": "2022-02-03T16:10:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-03T16:10:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:25:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.0", "product": { "name": "Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.src", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.src", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.src as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.src", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "relates_to_product_reference": "8Base-Openshift-Serverless-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T16:10:33+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-38297", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2012887" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: Command-line arguments may overwrite global data", "title": "Vulnerability summary" }, { "category": "other", "text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38297" }, { "category": "external", "summary": "RHBZ#2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A", "url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A" } ], "release_date": "2021-10-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T16:10:33+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: Command-line arguments may overwrite global data" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T16:10:33+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0432" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
rhsa-2022_1372
Vulnerability from csaf_redhat
Published
2022-04-13 18:48
Modified
2024-11-06 00:40
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security & bug fix update
Notes
Topic
Updated images that include numerous enhancements, security, and bug fixes
are now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat
Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
Bug Fix(es):
These updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
or more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes\nare now available for Red Hat OpenShift Data Foundation 4.10.0 on Red Hat\nEnterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nBug Fix(es):\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.10/html/4.10_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.\n\nor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1372", "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1898988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898988" }, { "category": "external", "summary": "1954708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954708" }, { "category": "external", "summary": "1956418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956418" }, { "category": "external", "summary": "1970123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970123" }, { "category": "external", "summary": "1972190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972190" }, { "category": "external", "summary": "1974344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974344" }, { "category": "external", "summary": "1981341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981341" }, { "category": "external", "summary": "1981694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981694" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1991462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991462" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1996830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996830" }, { "category": "external", "summary": "1996833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996833" }, { "category": "external", "summary": "1999689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999689" }, { "category": "external", "summary": "1999952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999952" }, { "category": "external", "summary": "2003532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003532" }, { "category": "external", "summary": "2005801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005801" }, { "category": "external", "summary": "2005919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005919" }, { "category": "external", "summary": "2021313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021313" }, { "category": "external", "summary": "2022424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022424" }, { "category": "external", "summary": "2022693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022693" }, { "category": "external", "summary": "2024107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024107" }, { "category": "external", "summary": "2024545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024545" }, { "category": "external", "summary": "2026007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026007" }, { "category": "external", "summary": "2027666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027666" }, { "category": "external", "summary": "2027826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027826" }, { "category": "external", "summary": "2028559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028559" }, { "category": "external", "summary": "2029413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029413" }, { "category": "external", "summary": "2030602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030602" }, { "category": "external", "summary": "2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "2030839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030839" }, { "category": "external", "summary": "2031023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031023" }, { "category": "external", "summary": "2031705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031705" }, { "category": "external", "summary": "2032404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032404" }, { "category": "external", "summary": "2032412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032412" }, { "category": "external", "summary": "2032656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032656" }, { "category": "external", "summary": "2032969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032969" }, { "category": "external", "summary": "2032984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032984" }, { "category": "external", "summary": "2033251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033251" }, { "category": "external", "summary": "2034003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034003" }, { "category": "external", "summary": "2034805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034805" }, { "category": "external", "summary": "2034904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034904" }, { "category": "external", "summary": "2035774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035774" }, { "category": "external", "summary": "2035995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035995" }, { "category": "external", "summary": "2036018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036018" }, { "category": "external", "summary": "2036211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036211" }, { "category": "external", "summary": "2037279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037279" }, { "category": "external", "summary": "2037318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037318" }, { "category": "external", "summary": "2037497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037497" }, { "category": "external", "summary": "2038884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038884" }, { "category": "external", "summary": "2039240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039240" }, { "category": "external", "summary": "2040682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040682" }, { "category": "external", "summary": "2041507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041507" }, { "category": "external", "summary": "2042866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042866" }, { "category": "external", "summary": "2043017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043017" }, { "category": "external", "summary": "2043028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043028" }, { "category": "external", "summary": "2043406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043406" }, { "category": "external", "summary": "2043513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043513" }, { "category": "external", "summary": "2044447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044447" }, { "category": "external", "summary": "2044823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044823" }, { "category": "external", "summary": "2045084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045084" }, { "category": "external", "summary": "2046186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046186" }, { "category": "external", "summary": "2046254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046254" }, { "category": "external", "summary": "2046677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046677" }, { "category": "external", "summary": "2046766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046766" }, { "category": "external", "summary": "2046887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046887" }, { "category": "external", "summary": "2047162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047162" }, { "category": "external", "summary": "2047201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047201" }, { "category": "external", "summary": "2047562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047562" }, { "category": "external", "summary": "2047565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047565" }, { "category": "external", "summary": "2047625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047625" }, { "category": "external", "summary": "2047632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047632" }, { "category": "external", "summary": "2047642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047642" }, { "category": "external", "summary": "2048107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048107" }, { "category": "external", "summary": "2048370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048370" }, { "category": "external", "summary": "2048458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048458" }, { "category": "external", "summary": "2049029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049029" }, { "category": "external", "summary": "2049075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049075" }, { "category": "external", "summary": "2049081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049081" }, { "category": "external", "summary": "2049424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049424" }, { "category": "external", "summary": "2049509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049509" }, { "category": "external", "summary": "2049718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049718" }, { "category": "external", "summary": "2049727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049727" }, { "category": "external", "summary": "2049771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049771" }, { "category": "external", "summary": "2049790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049790" }, { "category": "external", "summary": "2050056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050056" }, { "category": "external", "summary": "2050142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050142" }, { "category": "external", "summary": "2050402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050402" }, { "category": "external", "summary": "2050483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050483" }, { "category": "external", "summary": "2051249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051249" }, { "category": "external", "summary": "2051406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051406" }, { "category": "external", "summary": "2051599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051599" }, { "category": "external", "summary": "2051913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051913" }, { "category": "external", "summary": "2052027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052027" }, { "category": "external", "summary": "2052438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052438" }, { "category": "external", "summary": "2052937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052937" }, { "category": "external", "summary": "2052996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052996" }, { "category": "external", "summary": "2053156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053156" }, { "category": "external", "summary": "2053517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053517" }, { "category": "external", "summary": "2054147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054147" }, { "category": "external", "summary": "2054755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054755" }, { "category": "external", "summary": "2061251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061251" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1372.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security \u0026 bug fix update", "tracking": { "current_release_date": "2024-11-06T00:40:52+00:00", "generator": { "date": "2024-11-06T00:40:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:1372", "initial_release_date": "2022-04-13T18:48:58+00:00", "revision_history": [ { "date": "2022-04-13T18:48:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-13T18:48:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:40:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHODF 4.10 for RHEL 8", "product": { "name": "RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.10::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "product": { "name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "product_id": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "product": { "name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "product_id": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "product": { "name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "product_id": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "product_id": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "product_id": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "product_id": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "product_id": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "product": { "name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "product_id": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "product": { "name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "product_id": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "product": { "name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "product_id": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "product_id": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "product_id": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "product_id": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "product_id": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.10.0-35" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "product": { "name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "product_id": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.10.0-12" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "product": { "name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "product_id": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "product": { "name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "product_id": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.10.0-56" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.10.0-58" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.10.0-14" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.10.0-15" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.10.0-13" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "product_id": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.10.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "product_id": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.10.0-221" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.10.0-26" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.10.0-54" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.10.0-11" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64" }, "product_reference": "odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le" }, "product_reference": "odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x" }, "product_reference": "odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le" }, "product_reference": "odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64" }, "product_reference": "odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x" }, "product_reference": "odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "relates_to_product_reference": "8Base-RHODF-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64 as a component of RHODF 4.10 for RHEL 8", "product_id": "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64", "relates_to_product_reference": "8Base-RHODF-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-13T18:48:58+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-13T18:48:58+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-13T18:48:58+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-13T18:48:58+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-13T18:48:58+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-13T18:48:58+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:9de4f6848556d362dab3fcc534a6e7098649b353139d1b8d796317b8474125c2_s390x", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:d828aab4db3bb853a9c2be53ef65e968e7dca8faacb480e9c6802093181a8f16_amd64", "8Base-RHODF-4.10:odf4/cephcsi-rhel8@sha256:f41411e6c6d65e52a3e3bb6cf3582116646e8ebc4ae9bf8eac77a00433855b20_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4338ea20fce25b664e880066144a5de7769623373cbfde1f46666aace4d9b855_amd64", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:4ed1db89bdd6150f28721a3c18bcfa7e221b1b621c12ae8830fd35923dea08ca_ppc64le", "8Base-RHODF-4.10:odf4/mcg-core-rhel8@sha256:f2a35675f04b3852dadbea99fef57dcc85ab5670929f7b0d52981e227047123c_s390x", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:983c8661518fe3efa01e5d64b389043ac856f013b4ec346d5da252848d8b2252_ppc64le", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:e1ae5ed85e17ad3cdbdc5049f5c3064f2616c5a6f445ec9d38e7f915d494776b_amd64", "8Base-RHODF-4.10:odf4/mcg-operator-bundle@sha256:eb454980189ece047c2d97046f77ed67877ff0d6a17ea52621f28d9fba702d28_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:4a4bd7a6b537d75aaa982c308eedc805809c2576f5d75498a432991c7e199534_ppc64le", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:ae593d312597211d35a2d89cefdcf879eb1db1eac9bfdc76c756be78b111b5e7_s390x", "8Base-RHODF-4.10:odf4/mcg-rhel8-operator@sha256:e6162ae89bf73e29c304080e868d47f13c46e389c6f2f6bde856ebeda20306f5_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:09a8a3da7024fbd081caff8cd62c67c898beade0597ff0656d0994daa08b4166_ppc64le", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:3a6619c418c74824b6a69dfce26f2070aae8b7d56b7cea756ab68d5e2c459e07_amd64", "8Base-RHODF-4.10:odf4/ocs-must-gather-rhel8@sha256:d9332ec67415a78d38ee60b7d15c63475693590160caeb461767683b0dd21751_s390x", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:7cebd714435a398ade4f686d2943786d8485ea5333f5b16365991ae49303f097_ppc64le", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a640d9395a7dad7c5d2306af3ba60a3430358e705b647ebf272e38e27282ad4c_amd64", "8Base-RHODF-4.10:odf4/ocs-operator-bundle@sha256:a70904f7570095a0721e5fcf7bc4fe1c431112f6ef4437d1b5ed67f8462d7926_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:32a1d52cfc7b91c0186e5423245bd06e525c6890ed77bca7335e56c48e2cd86b_amd64", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:9759e45e271ef502e2ed6f7e12dc2ecb10e39fc0cd22e195f7d47edec39ff0fd_s390x", "8Base-RHODF-4.10:odf4/ocs-rhel8-operator@sha256:a3b3a3e9a8332d3b5d5137ff89e1843e6506507c2ebb069c9a7bbfcd03dfdd42_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:1d988be397cae4aad67a43534a2875edbee24135ba549549156fb8aa883f22a6_ppc64le", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:54f6bca97f44b76c065bbaed5915a97693ce1ea1a3f3a1cf65c610ff81622f3c_s390x", "8Base-RHODF-4.10:odf4/odf-console-rhel8@sha256:7c89981748d38fafa31c8a8d624381db9c14c07160de7bc13588a0b0e3673b33_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:84407db398089fe2b60b83f4cbd94fd30581d928d6edf614de5d34cec3f21014_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:c7e57040123bc4ef58444a7b2bbf076588876c56f8903e57a3646db0c4c430ca_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-operator-bundle@sha256:cca6c8289d099a0c6ad92387991089058f344d9fe33c63535898023e182856dc_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:c2a30fc5971995e4c3bf90f7c56733d74a3af9f3e59978d4705a3eee5d0b565a_amd64", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:e7daa827ed079b6f60419beebdf9a5adab484c5617edc6ed51ff4deb8e7ce735_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-rhel8-operator@sha256:fb700cd42c272775cdba1e9aab83572b48d8320d2de595f8b2dc9281b477b7cb_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:57d765f210d5aadc288a5ea5b8229effd18874e10ba7ae6a5fbbe53d745796e5_s390x", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:7da72672ed9f83988c559614794b5368093e28de7ec218a793b103c86be1490b_ppc64le", "8Base-RHODF-4.10:odf4/odf-csi-addons-sidecar-rhel8@sha256:d7f0286b395ff43611c591c1406a2f37821246a5543d24acfb92ccf622384fba_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:5cdee3d267742de595ad057858f43021938079d345e8f58a6eee892d78634c74_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:7c40a459ec0ef75b13dd63dae970688b4cf625f339f84c4d01600d41920a1510_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-must-gather-rhel8@sha256:f8c68e2a9112fadacfe4f3b9f9f6ceab32a72052b684a3402412a764618e8a9e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:257ca6d222964bd18c4d7b05531623696cda01108b5362a6e97a6c05efe71c8e_amd64", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:e9c083cd238fb4fee2c0ac5baca54d863487084e64288f75d7d94435eb772706_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-operator-bundle@sha256:f7cccdf83a047aa3cf59820c58bbf0d76ed1bf7e986b1a830d8eff2a145c21bc_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:4bd043601f813edae2aef686e907de2c1cb7799b375d60abe22af4c6229e1c20_s390x", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:76c90e7ac58c1fdb8a5d01a229f010ec517ea9d8c906fb4ce0eb0cd73a37a97d_ppc64le", "8Base-RHODF-4.10:odf4/odf-lvm-rhel8-operator@sha256:afa1f9113288540b9b273b80af6d41792aece2cdace2f9503a4f55e780fb3549_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:75382a495f60b766fa9eda0655ffbb0f71ee4cdae97460b57b6a4aeb5c05f002_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:bba27843af4366260fc01c4c67652bc8e84c038e2bbc69274cb090f6048ef448_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-operator-bundle@sha256:ca24dab680c6cc31c1ff20db6b428cfc312f33ba318c2bb2de11625b72dd6390_s390x", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:19ff08d09066658e51074527f75e194873b3351b6cb0bb47207c21bb537a4eef_ppc64le", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:9ef5cfb21028838a9c30b0e593e1b05a205046b4592452b1c23b8e257fa3ccb8_amd64", "8Base-RHODF-4.10:odf4/odf-multicluster-rhel8-operator@sha256:a59a966565220ca1aa6eb95803660949cfa6ed32a64b0c0c561ac229f4c7f6ca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:393e2ce8111ba011a91782b4f47175bb069d762bc14a434a37e10c8a76daabca_s390x", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:8597f6adc1865ab64ba0d42caa2793cf8f44b86251fd53e7a30ec00b3f1cbd20_ppc64le", "8Base-RHODF-4.10:odf4/odf-operator-bundle@sha256:dc4d9a53dea5573e3020ad5d1ea1018705b6be25294c722d29f57bd90564c58c_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:4ea80063a33a0524cffd54d2ee915332cd0bfafe8e448d1c283a9c80f46b8471_ppc64le", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:73fac885482871f744fcf2e5635be1e10d812845ba122d30446641f11d436099_amd64", "8Base-RHODF-4.10:odf4/odf-rhel8-operator@sha256:c53e6cb927dc1d241f1466f3d11af80fe64a89a48c215e11c65cb04e08cf35fb_s390x", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:2f872d7bfb2f4655edfe0ba42e70a6a69e90c129342cae2f2ba2d80c169d0afa_amd64", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:346a8438e87d63ac4020310d5226839d261bc483cebe6875bb8a82f166b0a782_ppc64le", "8Base-RHODF-4.10:odf4/odf-topolvm-rhel8@sha256:609c3b047342f5e6a8132891bb3f049e259a32fe650660adb36c84ccdb63ae3c_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:66d0b4370fc757e1c4cf7733308f6e7a75b7eb8887ef022af68f7174335dde6d_ppc64le", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:df61454d23b0c733a0ba643a07a85915914b56fbbc778a5707331bbac41a2afa_s390x", "8Base-RHODF-4.10:odf4/odr-cluster-operator-bundle@sha256:fd6d7f3775724702389a2dbd57869f6d9963dddaee3f9d5084992f15bcdde638_amd64", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:35c6cf9f55542331bdf59caade4564cfc83adf79dab83298de1838248a6607ce_s390x", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:733973b032ae9d5a436c6d2fa3b68647224b25ca2d93047bd63770109ba28c8e_ppc64le", "8Base-RHODF-4.10:odf4/odr-hub-operator-bundle@sha256:bfa02459d18d144adddebcc6ee8f612071065fc0fd5305bdaa2ed4338cbd9382_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:5d683d91aa19544c27311f53c1d7462d138fabe19af490e4e1052220eb34cdb7_amd64", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:8785852f2b30b04ac8696078f6fd8bcefa6e9e5ddc9c37e199b3679f295332fc_s390x", "8Base-RHODF-4.10:odf4/odr-rhel8-operator@sha256:d96c94c9f9cbb00b882b435c7f30b50ea8f1186ad14c65903a24e840b8ec3a29_ppc64le", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:4d863979f67280825c7a10cbcebc495972e3d0ac58f10f63987706d6f8c8f60f_s390x", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:8fabff5be7802f8de5f1026893ae4f7bafb66a1e1f70df16c667e537ee0bedcd_amd64", "8Base-RHODF-4.10:odf4/rook-ceph-rhel8-operator@sha256:afb3f630b3215e327122688dc9edf0b651fda692c29a2b861df7357492f54702_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:3808e1084febf2ee4d32e2ae6334c4feb17c1ac57df3c30d514227514cbd4a2c_ppc64le", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:60133217c4f4d5cc1e778e92f7de31a527ff43846aaebe5db6dd5d9978d7c2fb_s390x", "8Base-RHODF-4.10:odf4/volume-replication-rhel8-operator@sha256:ad89936da3510643ac92087fedfc71965cb4b1e2e1845162f6e04eeb02b5f857_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2022_0947
Vulnerability from csaf_redhat
Published
2022-03-16 15:45
Modified
2024-11-06 00:35
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.10.0 images:
RHEL-8-CNV-4.10
==============
kubevirt-velero-plugin-container-v4.10.0-8
virtio-win-container-v4.10.0-10
kubevirt-template-validator-container-v4.10.0-16
hostpath-csi-driver-container-v4.10.0-32
hostpath-provisioner-container-v4.10.0-32
hostpath-provisioner-operator-container-v4.10.0-62
cnv-must-gather-container-v4.10.0-110
virt-cdi-controller-container-v4.10.0-90
virt-cdi-apiserver-container-v4.10.0-90
virt-cdi-uploadserver-container-v4.10.0-90
virt-cdi-uploadproxy-container-v4.10.0-90
virt-cdi-operator-container-v4.10.0-90
virt-cdi-cloner-container-v4.10.0-90
virt-cdi-importer-container-v4.10.0-90
kubevirt-ssp-operator-container-v4.10.0-50
virt-api-container-v4.10.0-217
hyperconverged-cluster-webhook-container-v4.10.0-133
libguestfs-tools-container-v4.10.0-217
virt-handler-container-v4.10.0-217
virt-launcher-container-v4.10.0-217
virt-artifacts-server-container-v4.10.0-217
virt-controller-container-v4.10.0-217
node-maintenance-operator-container-v4.10.0-48
hyperconverged-cluster-operator-container-v4.10.0-133
virt-operator-container-v4.10.0-217
cnv-containernetworking-plugins-container-v4.10.0-49
kubemacpool-container-v4.10.0-49
bridge-marker-container-v4.10.0-49
ovs-cni-marker-container-v4.10.0-49
ovs-cni-plugin-container-v4.10.0-49
kubernetes-nmstate-handler-container-v4.10.0-49
cluster-network-addons-operator-container-v4.10.0-49
hco-bundle-registry-container-v4.10.0-696
Security Fix(es):
* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.10.0 images:\n\nRHEL-8-CNV-4.10\n\n==============\n\nkubevirt-velero-plugin-container-v4.10.0-8\nvirtio-win-container-v4.10.0-10\nkubevirt-template-validator-container-v4.10.0-16\nhostpath-csi-driver-container-v4.10.0-32\nhostpath-provisioner-container-v4.10.0-32\nhostpath-provisioner-operator-container-v4.10.0-62\ncnv-must-gather-container-v4.10.0-110\nvirt-cdi-controller-container-v4.10.0-90\nvirt-cdi-apiserver-container-v4.10.0-90\nvirt-cdi-uploadserver-container-v4.10.0-90\nvirt-cdi-uploadproxy-container-v4.10.0-90\nvirt-cdi-operator-container-v4.10.0-90\nvirt-cdi-cloner-container-v4.10.0-90\nvirt-cdi-importer-container-v4.10.0-90\nkubevirt-ssp-operator-container-v4.10.0-50\nvirt-api-container-v4.10.0-217\nhyperconverged-cluster-webhook-container-v4.10.0-133\nlibguestfs-tools-container-v4.10.0-217\nvirt-handler-container-v4.10.0-217\nvirt-launcher-container-v4.10.0-217\nvirt-artifacts-server-container-v4.10.0-217\nvirt-controller-container-v4.10.0-217\nnode-maintenance-operator-container-v4.10.0-48\nhyperconverged-cluster-operator-container-v4.10.0-133\nvirt-operator-container-v4.10.0-217\ncnv-containernetworking-plugins-container-v4.10.0-49\nkubemacpool-container-v4.10.0-49\nbridge-marker-container-v4.10.0-49\novs-cni-marker-container-v4.10.0-49\novs-cni-plugin-container-v4.10.0-49\nkubernetes-nmstate-handler-container-v4.10.0-49\ncluster-network-addons-operator-container-v4.10.0-49\nhco-bundle-registry-container-v4.10.0-696\n\nSecurity Fix(es):\n\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0947", "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1760028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760028" }, { "category": "external", "summary": "1855182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1855182" }, { "category": "external", "summary": "1906151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906151" }, { "category": "external", "summary": "1918294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918294" }, { "category": "external", "summary": "1935217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935217" }, { "category": "external", "summary": "1945586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945586" }, { "category": "external", "summary": "1958085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958085" }, { "category": "external", "summary": "1959039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959039" }, { "category": "external", "summary": "1975978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975978" }, { "category": "external", "summary": "1983079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983079" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1986970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986970" }, { "category": "external", "summary": "1987009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987009" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990061" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1992231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992231" }, { "category": "external", "summary": "1993454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993454" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1997540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997540" }, { "category": "external", "summary": "1998300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998300" }, { "category": "external", "summary": "1999110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999110" }, { "category": "external", "summary": "1999636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999636" }, { "category": "external", "summary": "2000480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000480" }, { "category": "external", "summary": "2001984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001984" }, { "category": "external", "summary": "2001987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001987" }, { "category": "external", "summary": "2002272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002272" }, { "category": "external", "summary": "2003704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003704" }, { "category": "external", "summary": "2007397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007397" }, { "category": "external", "summary": "2008140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008140" }, { "category": "external", "summary": "2008411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008411" }, { "category": "external", "summary": "2008938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008938" }, { "category": "external", "summary": "2008949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008949" }, { "category": "external", "summary": "2008975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008975" }, { "category": "external", "summary": "2010540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010540" }, { "category": "external", "summary": "2010908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010908" }, { "category": "external", "summary": "2012920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012920" }, { "category": "external", "summary": "2013160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013160" }, { "category": "external", "summary": "2013455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013455" }, { "category": "external", "summary": "2015327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015327" }, { "category": "external", "summary": "2017255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017255" }, { "category": "external", "summary": "2018457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018457" }, { "category": "external", "summary": "2018925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018925" }, { "category": "external", "summary": "2018970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018970" }, { "category": "external", "summary": "2019053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019053" }, { "category": "external", "summary": "2021992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021992" }, { "category": "external", "summary": "2025295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025295" }, { "category": "external", "summary": "2025750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025750" }, { "category": "external", "summary": "2025878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025878" }, { "category": "external", "summary": "2026336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026336" }, { "category": "external", "summary": "2026363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026363" }, { "category": "external", "summary": "2026665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026665" }, { "category": "external", "summary": "2026667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026667" }, { "category": "external", "summary": "2027420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027420" }, { "category": "external", "summary": "2027922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027922" }, { "category": "external", "summary": "2029343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029343" }, { "category": "external", "summary": "2029767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029767" }, { "category": "external", "summary": "2030660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030660" }, { "category": "external", "summary": "2030686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030686" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "2031033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031033" }, { "category": "external", "summary": "2031688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031688" }, { "category": "external", "summary": "2031727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031727" }, { "category": "external", "summary": "2031919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031919" }, { "category": "external", "summary": "2032045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032045" }, { "category": "external", "summary": "2032845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032845" }, { "category": "external", "summary": "2032873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032873" }, { "category": "external", "summary": "2032876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032876" }, { "category": "external", "summary": "2033240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033240" }, { "category": "external", "summary": "2033252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033252" }, { "category": "external", "summary": "2034544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034544" }, { "category": "external", "summary": "2035008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035008" }, { "category": "external", "summary": "2035324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035324" }, { "category": "external", "summary": "2035658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035658" }, { "category": "external", "summary": "2035677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035677" }, { "category": "external", "summary": "2036220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036220" }, { "category": "external", "summary": "2036483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036483" }, { "category": "external", "summary": "2036605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036605" }, { "category": "external", "summary": "2037270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037270" }, { "category": "external", "summary": "2037290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037290" }, { "category": "external", "summary": "2037312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037312" }, { "category": "external", "summary": "2037421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037421" }, { "category": "external", "summary": "2038679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038679" }, { "category": "external", "summary": "2038825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038825" }, { "category": "external", "summary": "2038831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038831" }, { "category": "external", "summary": "2038985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038985" }, { "category": "external", "summary": "2039196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039196" }, { "category": "external", "summary": "2039208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039208" }, { "category": "external", "summary": "2039489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039489" }, { "category": "external", "summary": "2039683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039683" }, { "category": "external", "summary": "2039686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039686" }, { "category": "external", "summary": "2039691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039691" }, { "category": "external", "summary": "2040113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040113" }, { "category": "external", "summary": "2040115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040115" }, { "category": "external", "summary": "2041519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041519" }, { "category": "external", "summary": "2041530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041530" }, { "category": "external", "summary": "2042139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042139" }, { "category": "external", "summary": "2042799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042799" }, { "category": "external", "summary": "2042842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042842" }, { "category": "external", "summary": "2042856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042856" }, { "category": "external", "summary": "2042880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042880" }, { "category": "external", "summary": "2042908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042908" }, { "category": "external", "summary": "2044348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044348" }, { "category": "external", "summary": "2044398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044398" }, { "category": "external", "summary": "2046271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046271" }, { "category": "external", "summary": "2048227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048227" }, { "category": "external", "summary": "2048275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048275" }, { "category": "external", "summary": "2051105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051105" }, { "category": "external", "summary": "2051693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051693" }, { "category": "external", "summary": "2051968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051968" }, { "category": "external", "summary": "2052489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052489" }, { "category": "external", "summary": "2053027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053027" }, { "category": "external", "summary": "2058167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058167" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0947.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update", "tracking": { "current_release_date": "2024-11-06T00:35:09+00:00", "generator": { "date": "2024-11-06T00:35:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0947", "initial_release_date": "2022-03-16T15:45:58+00:00", "revision_history": [ { "date": "2022-03-16T15:45:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-16T15:45:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:35:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.10 for RHEL 8", "product": { "name": "CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.10::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.10.0-110" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.10.0-696" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.10.0-62" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.10.0-133" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.10.0-133" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.10.0-50" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.10.0-48" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product_id": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.10.0-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.10.0-217" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-16T15:45:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2021_4914
Vulnerability from csaf_redhat
Published
2021-12-02 16:59
Modified
2024-11-06 00:12
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.8.3 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.8.3 images:
RHEL-8-CNV-4.8
==============
hostpath-provisioner-container-v4.8.3-4
kubevirt-v2v-conversion-container-v4.8.3-3
virt-cdi-cloner-container-v4.8.3-4
virt-cdi-operator-container-v4.8.3-4
virt-cdi-uploadproxy-container-v4.8.3-4
virt-launcher-container-v4.8.3-9
vm-import-operator-container-v4.8.3-7
virt-cdi-apiserver-container-v4.8.3-4
kubevirt-vmware-container-v4.8.3-3
virt-api-container-v4.8.3-9
vm-import-virtv2v-container-v4.8.3-7
virtio-win-container-v4.8.3-3
node-maintenance-operator-container-v4.8.3-2
hostpath-provisioner-operator-container-v4.8.3-4
virt-cdi-controller-container-v4.8.3-4
virt-cdi-importer-container-v4.8.3-4
bridge-marker-container-v4.8.3-3
ovs-cni-marker-container-v4.8.3-3
virt-handler-container-v4.8.3-9
virt-controller-container-v4.8.3-9
cnv-containernetworking-plugins-container-v4.8.3-3
kubevirt-template-validator-container-v4.8.3-3
hyperconverged-cluster-webhook-container-v4.8.3-5
ovs-cni-plugin-container-v4.8.3-3
hyperconverged-cluster-operator-container-v4.8.3-5
kubevirt-ssp-operator-container-v4.8.3-4
virt-cdi-uploadserver-container-v4.8.3-4
kubemacpool-container-v4.8.3-5
vm-import-controller-container-v4.8.3-7
virt-operator-container-v4.8.3-9
kubernetes-nmstate-handler-container-v4.8.3-8
cnv-must-gather-container-v4.8.3-12
cluster-network-addons-operator-container-v4.8.3-8
hco-bundle-registry-container-v4.8.3-58
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.8.3 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.8.3 images:\n\nRHEL-8-CNV-4.8\n==============\nhostpath-provisioner-container-v4.8.3-4\nkubevirt-v2v-conversion-container-v4.8.3-3\nvirt-cdi-cloner-container-v4.8.3-4\nvirt-cdi-operator-container-v4.8.3-4\nvirt-cdi-uploadproxy-container-v4.8.3-4\nvirt-launcher-container-v4.8.3-9\nvm-import-operator-container-v4.8.3-7\nvirt-cdi-apiserver-container-v4.8.3-4\nkubevirt-vmware-container-v4.8.3-3\nvirt-api-container-v4.8.3-9\nvm-import-virtv2v-container-v4.8.3-7\nvirtio-win-container-v4.8.3-3\nnode-maintenance-operator-container-v4.8.3-2\nhostpath-provisioner-operator-container-v4.8.3-4\nvirt-cdi-controller-container-v4.8.3-4\nvirt-cdi-importer-container-v4.8.3-4\nbridge-marker-container-v4.8.3-3\novs-cni-marker-container-v4.8.3-3\nvirt-handler-container-v4.8.3-9\nvirt-controller-container-v4.8.3-9\ncnv-containernetworking-plugins-container-v4.8.3-3\nkubevirt-template-validator-container-v4.8.3-3\nhyperconverged-cluster-webhook-container-v4.8.3-5\novs-cni-plugin-container-v4.8.3-3\nhyperconverged-cluster-operator-container-v4.8.3-5\nkubevirt-ssp-operator-container-v4.8.3-4\nvirt-cdi-uploadserver-container-v4.8.3-4\nkubemacpool-container-v4.8.3-5\nvm-import-controller-container-v4.8.3-7\nvirt-operator-container-v4.8.3-9\nkubernetes-nmstate-handler-container-v4.8.3-8\ncnv-must-gather-container-v4.8.3-12\ncluster-network-addons-operator-container-v4.8.3-8\nhco-bundle-registry-container-v4.8.3-58\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4914", "url": "https://access.redhat.com/errata/RHSA-2021:4914" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1997017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997017" }, { "category": "external", "summary": "1998855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998855" }, { "category": "external", "summary": "2000251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000251" }, { "category": "external", "summary": "2001270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001270" }, { "category": "external", "summary": "2001281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001281" }, { "category": "external", "summary": "2001901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001901" }, { "category": "external", "summary": "2007336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007336" }, { "category": "external", "summary": "2007776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007776" }, { "category": "external", "summary": "2008511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008511" }, { "category": "external", "summary": "2012890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012890" }, { "category": "external", "summary": "2025475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025475" }, { "category": "external", "summary": "2026881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026881" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4914.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.3 Images security and bug fix update", "tracking": { "current_release_date": "2024-11-06T00:12:58+00:00", "generator": { "date": "2024-11-06T00:12:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4914", "initial_release_date": "2021-12-02T16:59:15+00:00", "revision_history": [ { "date": "2021-12-02T16:59:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-02T16:59:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:12:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.8 for RHEL 8", "product": { "name": "CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.8.3-8" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "product": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.8.3-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "product": { "name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "product_id": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.8.3-3" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.8.3-2" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "product": { "name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "product_id": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v4.8.3-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.8.3-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "product": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.8.3-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64", "product": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64", "product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.8.3-7" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64" }, "product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64" }, "product_reference": "container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64" }, "product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" }, "product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64", "relates_to_product_reference": "8Base-CNV-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-02T16:59:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4914" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-02T16:59:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4914" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:aba87ec7c157d63dee9d025ef57dead5f3d8feb0a5e0f52ff217f4747b02cfd6_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:4cec70b8f22c1c9bb4f623374f7fffd4edff33eee91217a0bae4b89a5ef4ab98_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:463d9cedb17f2c73f9826141cff4db72c8036b3504dfb1e2892c5928cac7ce02_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5dbe0b381d7db82b09c8c56b89a3c3fb5765e48f239ba092482247674ef9db25_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:95165db1682a6ecaa4ed5156b7903cf80be348be39e30e2a6f683a54f9f919be_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:0599dbcdd281283ab17d8f758a59e893e21a5459217e7c723e3621c5ca890d73_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c7593fb08d76457327f38f8a146a01fca13ac7c8eeb990bb9b5bd9028368f8dd_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_4902
Vulnerability from csaf_redhat
Published
2021-12-01 17:22
Modified
2024-11-06 00:13
Summary
Red Hat Security Advisory: ACS 3.67 security and enhancement update
Notes
Topic
Updated images are now available for Red Hat Advanced Cluster Security for
Kubernetes (RHACS).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The release of RHACS 3.67 provides the following new features, bug fixes, security patches and system changes:
OpenShift Dedicated support
RHACS 3.67 is thoroughly tested and supported on OpenShift Dedicated on Amazon Web Services and Google Cloud Platform.
1. Use OpenShift OAuth server as an identity provider
If you are using RHACS with OpenShift, you can now configure the built-in OpenShift OAuth server as an identity provider for RHACS.
2. Enhancements for CI outputs
Red Hat has improved the usability of RHACS CI integrations. CI outputs now show additional detailed information about the vulnerabilities and the security policies responsible for broken builds.
3. Runtime Class policy criteria
Users can now use RHACS to define the container runtime configuration that may be used to run a pod’s containers using the Runtime Class policy criteria.
Security Fix(es):
* civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API (CVE-2020-27304)
* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)
* nodejs-prismjs: ReDoS vulnerability (CVE-2021-3801)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* helm: information disclosure vulnerability (CVE-2021-32690)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes
The release of RHACS 3.67 includes the following bug fixes:
1. Previously, when using RHACS with the Compliance Operator integration, RHACS did not respect or populate Compliance Operator TailoredProfiles. This has been fixed.
2. Previously, the Alpine Linux package manager (APK) in Image policy looked for the presence of apk package in the image rather than the apk-tools package. This issue has been fixed.
System changes
The release of RHACS 3.67 includes the following system changes:
1. Scanner now identifies vulnerabilities in Ubuntu 21.10 images.
2. The Port exposure method policy criteria now include route as an exposure method.
3. The OpenShift: Kubeadmin Secret Accessed security policy now allows the OpenShift Compliance Operator to check for the existence of the Kubeadmin secret without creating a violation.
4. The OpenShift Compliance Operator integration now supports using TailoredProfiles.
5. The RHACS Jenkins plugin now provides additional security information.
6. When you enable the environment variable ROX_NETWORK_ACCESS_LOG for Central, the logs contain the Request URI and X-Forwarded-For header values.
7. The default uid:gid pair for the Scanner image is now 65534:65534.
8. RHACS adds a new default Scope Manager role that includes minimum permissions to create and modify access scopes.
9. If microdnf is part of an image or shows up in process execution, RHACS reports it as a security violation for the Red Hat Package Manager in Image or the Red Hat Package Manager Execution security policies.
10. In addition to manually uploading vulnerability definitions in offline mode, you can now upload definitions in online mode.
11. You can now format the output of the following roxctl CLI commands in table, csv, or JSON format: image scan, image check & deployment check
12. You can now use a regular expression for the deployment name while specifying policy exclusions
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images are now available for Red Hat Advanced Cluster Security for\nKubernetes (RHACS).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The release of RHACS 3.67 provides the following new features, bug fixes, security patches and system changes:\n\nOpenShift Dedicated support\n\nRHACS 3.67 is thoroughly tested and supported on OpenShift Dedicated on Amazon Web Services and Google Cloud Platform.\n\n1. Use OpenShift OAuth server as an identity provider\nIf you are using RHACS with OpenShift, you can now configure the built-in OpenShift OAuth server as an identity provider for RHACS. \n\n2. Enhancements for CI outputs\nRed Hat has improved the usability of RHACS CI integrations. CI outputs now show additional detailed information about the vulnerabilities and the security policies responsible for broken builds.\n\n3. Runtime Class policy criteria\nUsers can now use RHACS to define the container runtime configuration that may be used to run a pod\u2019s containers using the Runtime Class policy criteria.\n\nSecurity Fix(es):\n\n* civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API (CVE-2020-27304)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* nodejs-prismjs: ReDoS vulnerability (CVE-2021-3801)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* helm: information disclosure vulnerability (CVE-2021-32690)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes\nThe release of RHACS 3.67 includes the following bug fixes:\n\n1. Previously, when using RHACS with the Compliance Operator integration, RHACS did not respect or populate Compliance Operator TailoredProfiles. This has been fixed.\n\n2. Previously, the Alpine Linux package manager (APK) in Image policy looked for the presence of apk package in the image rather than the apk-tools package. This issue has been fixed.\n\nSystem changes\nThe release of RHACS 3.67 includes the following system changes:\n\n1. Scanner now identifies vulnerabilities in Ubuntu 21.10 images.\n2. The Port exposure method policy criteria now include route as an exposure method.\n3. The OpenShift: Kubeadmin Secret Accessed security policy now allows the OpenShift Compliance Operator to check for the existence of the Kubeadmin secret without creating a violation.\n4. The OpenShift Compliance Operator integration now supports using TailoredProfiles.\n5. The RHACS Jenkins plugin now provides additional security information.\n6. When you enable the environment variable ROX_NETWORK_ACCESS_LOG for Central, the logs contain the Request URI and X-Forwarded-For header values.\n7. The default uid:gid pair for the Scanner image is now 65534:65534.\n8. RHACS adds a new default Scope Manager role that includes minimum permissions to create and modify access scopes.\n9. If microdnf is part of an image or shows up in process execution, RHACS reports it as a security violation for the Red Hat Package Manager in Image or the Red Hat Package Manager Execution security policies.\n10. In addition to manually uploading vulnerability definitions in offline mode, you can now upload definitions in online mode. \n11. You can now format the output of the following roxctl CLI commands in table, csv, or JSON format: image scan, image check \u0026 deployment check\n12. You can now use a regular expression for the deployment name while specifying policy exclusions", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4902", "url": "https://access.redhat.com/errata/RHSA-2021:4902" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2005445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2016640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640" }, { "category": "external", "summary": "ROX-9371", "url": "https://issues.redhat.com/browse/ROX-9371" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4902.json" } ], "title": "Red Hat Security Advisory: ACS 3.67 security and enhancement update", "tracking": { "current_release_date": "2024-11-06T00:13:08+00:00", "generator": { "date": "2024-11-06T00:13:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4902", "initial_release_date": "2021-12-01T17:22:46+00:00", "revision_history": [ { "date": "2021-12-01T17:22:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-01T17:22:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:13:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHACS 3.67 for RHEL 8", "product": { "name": "RHACS 3.67 for RHEL 8", "product_id": "8Base-RHACS-3.67", "product_identification_helper": { "cpe": "cpe:/a:redhat:advanced_cluster_security:3.67::el8" } } } ], "category": "product_family", "name": "Red Hat Advanced Cluster Security for Kubernetes" }, { "branches": [ { "category": "product_version", "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "product": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.67.0-2" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "product": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.67.0-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64 as a component of RHACS 3.67 for RHEL 8", "product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" }, "product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "relates_to_product_reference": "8Base-RHACS-3.67" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64 as a component of RHACS 3.67 for RHEL 8", "product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" }, "product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "relates_to_product_reference": "8Base-RHACS-3.67" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-10-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016640" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in CivetWeb (embeddable web server/library). Due to a directory traversal issue, an attacker is able to add or overwrite files that are subsequently executed which lead to impact to confidentiality, integrity, and availability of the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only impacts CivetWeb-based web applications that use the built-in file upload form handler (full working example in the \u201cembedded_c\u201d example in the CivetWeb sources).\n\nRed Hat Advanced Cluster Security includes code from CivetWeb in the Collector component, however it does not use the file upload form handler, hence is not impacted by this vulnerability. This vulnerability is rated Low for Red Hat Advanced Cluster Security.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27304" }, { "category": "external", "summary": "RHBZ#2016640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27304", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304" }, { "category": "external", "summary": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ", "url": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ" }, { "category": "external", "summary": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/", "url": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/" } ], "release_date": "2021-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-3801", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2005445" } ], "notes": [ { "category": "description", "text": "Insufficient Regular Expression Complexity in prismjs leads to a Regular Expression Denial of Service (ReDoS) attack. An unauthenticated attacker can exploit this flaw to cause an application to consume an excess amount of CPU by providing a crafted HTML comment as input. This can result in a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-prismjs: ReDoS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of prismjs. However due to the instance being read only and behind OpenShift OAuth, it has been given a Low impact. Additionally it has been marked as wont-fix at this time and may be fixed in a future release.\n\nJust as OCP, OpenShift ServiceMesh (OSSM) components are behind OpenShift OAuth what reducing impact to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3801" }, { "category": "external", "summary": "RHBZ#2005445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801" } ], "release_date": "2021-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-prismjs: ReDoS vulnerability" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-32690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1978144" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32690" }, { "category": "external", "summary": "RHBZ#1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf", "url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf" } ], "release_date": "2021-06-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: information disclosure vulnerability" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
rhsa-2021_4722
Vulnerability from csaf_redhat
Published
2021-11-17 15:38
Modified
2024-11-06 00:10
Summary
Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 2.6.8 RPMs.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 2.6.8 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 2.6.8 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4722", "url": "https://access.redhat.com/errata/RHSA-2021:4722" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2012329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4722.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update", "tracking": { "current_release_date": "2024-11-06T00:10:29+00:00", "generator": { "date": "2024-11-06T00:10:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4722", "initial_release_date": "2021-11-17T15:38:20+00:00", "revision_history": [ { "date": "2021-11-17T15:38:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-17T15:38:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:10:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 2.6 for RHEL 8", "product": { "name": "CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8" } } }, { "category": "product_name", "name": "CNV 2.6 for RHEL 7", "product": { "name": "CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el7" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "kubevirt-0:2.6.8-211.el8.src", "product": { "name": "kubevirt-0:2.6.8-211.el8.src", "product_id": "kubevirt-0:2.6.8-211.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@2.6.8-211.el8?arch=src" } } }, { "category": "product_version", "name": "kubevirt-0:2.6.8-211.el7.src", "product": { "name": "kubevirt-0:2.6.8-211.el7.src", "product_id": "kubevirt-0:2.6.8-211.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@2.6.8-211.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "product": { "name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "product_id": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.8-211.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.8-211.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "product": { "name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "product_id": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.8-211.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.8-211.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:2.6.8-211.el7.src as a component of CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src" }, "product_reference": "kubevirt-0:2.6.8-211.el7.src", "relates_to_product_reference": "7Server-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64 as a component of CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64" }, "product_reference": "kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "relates_to_product_reference": "7Server-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64 as a component of CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "relates_to_product_reference": "7Server-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:2.6.8-211.el8.src as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src" }, "product_reference": "kubevirt-0:2.6.8-211.el8.src", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64" }, "product_reference": "kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64", "relates_to_product_reference": "8Base-CNV-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-17T15:38:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4722" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-17T15:38:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4722" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-2.6:kubevirt-0:2.6.8-211.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.8-211.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.8-211.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.8-211.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3585
Vulnerability from csaf_redhat
Published
2021-09-21 10:07
Modified
2024-11-05 23:56
Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3585", "url": "https://access.redhat.com/errata/RHSA-2021:3585" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset", "url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3585.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security update", "tracking": { "current_release_date": "2024-11-05T23:56:33+00:00", "generator": { "date": "2024-11-05T23:56:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:3585", "initial_release_date": "2021-09-21T10:07:10+00:00", "revision_history": [ { "date": "2021-09-21T10:07:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-21T10:07:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T23:56:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8040020210909125047:5081a262", "product": { "name": "go-toolset:rhel8:8040020210909125047:5081a262", "product_id": "go-toolset:rhel8:8040020210909125047:5081a262", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8040020210909125047:5081a262" } } }, { "category": "product_version", "name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product": { "name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_id": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product": { "name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_id": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product": { "name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_id": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product": { "name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_id": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "product": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "product": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=src" } } }, { "category": "product_version", "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "product": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product": { "name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_id": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product": { "name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_id": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_id": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_id": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_id": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product": { "name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_id": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.15.14-2.module%2Bel8.4.0%2B12542%2Be3fec473?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, "product_reference": "go-toolset:rhel8:8040020210909125047:5081a262", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src" }, "product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64" }, "product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64" }, "product_reference": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64" }, "product_reference": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64" }, "product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le" }, "product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x" }, "product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src" }, "product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64" }, "product_reference": "go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64" }, "product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le" }, "product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x" }, "product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src" }, "product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64" }, "product_reference": "golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64" }, "product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le" }, "product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x" }, "product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64" }, "product_reference": "golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" }, "product_reference": "golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" }, "product_reference": "golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64 as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64" }, "product_reference": "golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" }, "product_reference": "golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch as a component of go-toolset:rhel8:8040020210909125047:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" }, "product_reference": "golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T10:07:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3585" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:go-toolset-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-bin-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-docs-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-misc-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-race-0:1.15.14-2.module+el8.4.0+12542+e3fec473.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-src-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210909125047:5081a262:golang-tests-0:1.15.14-2.module+el8.4.0+12542+e3fec473.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" } ] }
rhsa-2022_0260
Vulnerability from csaf_redhat
Published
2022-01-25 13:55
Modified
2024-11-06 00:21
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.1
(Train).
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration
Security Fix(es):
* net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0260", "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0260.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update", "tracking": { "current_release_date": "2024-11-06T00:21:53+00:00", "generator": { "date": "2024-11-06T00:21:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0260", "initial_release_date": "2022-01-25T13:55:40+00:00", "revision_history": [ { "date": "2022-01-25T13:55:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-25T13:55:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:21:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-7.el8ost.src", "product": { "name": "etcd-0:3.3.23-7.el8ost.src", "product_id": "etcd-0:3.3.23-7.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-7.el8ost.x86_64", "product": { "name": "etcd-0:3.3.23-7.el8ost.x86_64", "product_id": "etcd-0:3.3.23-7.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "product_id": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-7.el8ost.ppc64le", "product": { "name": "etcd-0:3.3.23-7.el8ost.ppc64le", "product_id": "etcd-0:3.3.23-7.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-7.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-7.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-7.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le" }, "product_reference": "etcd-0:3.3.23-7.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-7.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src" }, "product_reference": "etcd-0:3.3.23-7.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64" }, "product_reference": "etcd-0:3.3.23-7.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-7.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-25T13:55:40+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-25T13:55:40+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-25T13:55:40+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-7.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-7.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http: limit growth of header canonicalization cache" } ] }
rhsa-2022_0557
Vulnerability from csaf_redhat
Published
2022-02-23 12:47
Modified
2024-11-06 00:29
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.9.22 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.9.22 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0557", "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0557.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update", "tracking": { "current_release_date": "2024-11-06T00:29:55+00:00", "generator": { "date": "2024-11-06T00:29:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0557", "initial_release_date": "2022-02-23T12:47:14+00:00", "revision_history": [ { "date": "2022-02-23T12:47:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-23T12:47:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:29:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "product": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.src", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.src", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.src", "product": { "name": "cri-tools-0:1.22.0-2.el8.src", "product_id": "cri-tools-0:1.22.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "product": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "product_id": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.src", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.src", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.x86_64", "product": { "name": "cri-tools-0:1.22.0-2.el8.x86_64", "product_id": "cri-tools-0:1.22.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "product": { "name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "product_id": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-redistributable@0.13.1-2.rhaos4.9.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1644822177-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.aarch64", "product": { "name": "cri-tools-0:1.22.0-2.el8.aarch64", "product_id": "cri-tools-0:1.22.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.ppc64le", "product": { "name": "cri-tools-0:1.22.0-2.el8.ppc64le", "product_id": "cri-tools-0:1.22.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "product": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "product_id": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "product": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "product_id": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "product": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "product_id": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_id": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_id": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_id": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.1-17.rhaos4.9.git3029b1d.2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el8.s390x", "product": { "name": "cri-tools-0:1.22.0-2.el8.s390x", "product_id": "cri-tools-0:1.22.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "product_id": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_id": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_id": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-5.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-3.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202202140924.p0.g340e212.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debugsource@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-central-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-host-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "product": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_id": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.12-vtep-debuginfo@21.12.0-25.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64" }, "product_reference": "butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64" }, "product_reference": "butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64" }, "product_reference": "butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch" }, "product_reference": "butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64" }, "product_reference": "cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64" }, "product_reference": "cri-tools-0:1.22.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le" }, "product_reference": "cri-tools-0:1.22.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x" }, "product_reference": "cri-tools-0:1.22.0-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src" }, "product_reference": "cri-tools-0:1.22.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64" }, "product_reference": "cri-tools-0:1.22.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64" }, "product_reference": "ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-23T12:47:14+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-23T12:47:14+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-23T12:47:14+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-23T12:47:14+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202202111950.p0.g4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.1-17.rhaos4.9.git3029b1d.2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.src", "8Base-RHOSE-4.9:golang-github-prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1644822177-1.el8.src", "8Base-RHOSE-4.9:openshift-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202202140924.p0.g340e212.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202202111950.p0.gb93fd35.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.src", "8Base-RHOSE-4.9:ovn21.12-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-central-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-debugsource-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-host-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.12-vtep-debuginfo-0:21.12.0-25.el8fdp.x86_64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.aarch64", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.ppc64le", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.s390x", "8Base-RHOSE-4.9:prometheus-promu-0:0.5.0-5.git642a960.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-2.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-2.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-3.rhaos4.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2022_0577
Vulnerability from csaf_redhat
Published
2022-03-28 09:34
Modified
2024-11-06 00:30
Summary
Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]
Notes
Topic
The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0577", "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990573" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1992841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992841" }, { "category": "external", "summary": "1994859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994859" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2000772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000772" }, { "category": "external", "summary": "2001547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001547" }, { "category": "external", "summary": "2002961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002961" }, { "category": "external", "summary": "2005360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005360" }, { "category": "external", "summary": "2008601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008601" }, { "category": "external", "summary": "2015772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015772" }, { "category": "external", "summary": "2032048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032048" }, { "category": "external", "summary": "WINC-747", "url": "https://issues.redhat.com/browse/WINC-747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0577.json" } ], "title": "Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]", "tracking": { "current_release_date": "2024-11-06T00:30:12+00:00", "generator": { "date": "2024-11-06T00:30:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0577", "initial_release_date": "2022-03-28T09:34:15+00:00", "revision_history": [ { "date": "2022-03-28T09:34:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T09:34:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:30:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product": { "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product_id": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product_identification_helper": { "purl": "pkg:oci/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle\u0026tag=v5.0.0-5" } } }, { "category": "product_version", "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product": { "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product_id": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product_identification_helper": { "purl": "pkg:oci/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator\u0026tag=5.0.0-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64" }, "product_reference": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" }, "product_reference": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:34:15+00:00", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2022_0318
Vulnerability from csaf_redhat
Published
2022-01-27 16:52
Modified
2024-11-06 00:23
Summary
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update
Notes
Topic
An update is now available for Red Hat Openshift distributed tracing 2.1.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Release of Red Hat OpenShift distributed Tracing provides these changes:
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
The Red Hat OpenShift distributed tracing release notes provide information on
the features and known issues:
https://docs.openshift.com/container-platform/latest/distr_tracing/distributed-tracing-release-notes.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Openshift distributed tracing 2.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Release of Red Hat OpenShift distributed Tracing provides these changes:\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThe Red Hat OpenShift distributed tracing release notes provide information on\nthe features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distributed-tracing-release-notes.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0318", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "TRACING-2235", "url": "https://issues.redhat.com/browse/TRACING-2235" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0318.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update", "tracking": { "current_release_date": "2024-11-06T00:23:58+00:00", "generator": { "date": "2024-11-06T00:23:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0318", "initial_release_date": "2022-01-27T16:52:20+00:00", "revision_history": [ { "date": "2022-01-27T16:52:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-28T15:04:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:23:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift distributed tracing 2.1", "product": { "name": "Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_distributed_tracing:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift distributed tracing" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "product_id": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "product_id": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "product_id": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "product_id": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "product_id": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.29.1-8" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.29.1-2" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "product_id": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.29.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.41.1-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.41.1-7" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.41.1-3" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64 as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le as a component of Red Hat OpenShift distributed tracing 2.1", "product_id": "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-27T16:52:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-27T16:52:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/distr_tracing/distr_tracing_install/distr-tracing-updating.html", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:421222e82c3b137992ee05f0cb3564c8ce04bbe9582a26c62df6793d7248bb42_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:98c37aeb7d37c3dbbc51705ef00e6d0bf0fc34f89b6433d1b6c7dbabd8a18b56_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-agent-rhel8@sha256:addd2534475c44a2bbedc9d1c833255a8070a0bfb9f5a1457cb56693926315be_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:006a540ef57adcd939a85a4915fa3dbc63fd2b105c2f43c2b46d8de5108f6925_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:054b789cdfc9797aae8dcb9b2787274ea6ee304a753ff2567fc147b8aceff203_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-all-in-one-rhel8@sha256:0559883044ebb6d30405b64851187a09faee0ee142bb9aa1cc8011d5c4a43728_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:cd9f5edfe04560ce6b53298dcb3b26d3893916a55c5cffb6b699b2ebb03dd4b7_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e747c1f5f990563ee1df544037dfc4c2f7cd647c09441acb29331635feefa439_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-collector-rhel8@sha256:e98bd13e0530f61268dd6486fbccd4a2eda4e11cf9dfcf2997eb309f22cd4f48_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:81b861e6c53934eb556f568f099d421f0d351a62e390fab639fc987c40ad8c70_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ae35e80aa25c5b3a26145805053e10688b1b51929b9b7001063a126568744225_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc01bdbc5ac3d24a4000bcc182662dd3bb3609a6a62339b36baa99a75dee8a81_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:15be113cd998050b49fb6465b8f14345578d7296327d5951d13d506b63ebfd2f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:b19b70fb4aa1dc0665ab05dd4a6223eaf5c7ad3d077048bee9fa6d473a54f5e1_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-es-rollover-rhel8@sha256:dd9536b4b7e1a3ee7a5a8eb62b9ff3b84a897d2acd01243be815445003b42738_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c0f8ddd8da5763b62f720efcc29107db6e5f409a3f77cd93f907966440af3720_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:c761e663dd0492ef64068b3188d02319664338592e194c44337e08002dc6402f_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-ingester-rhel8@sha256:d576a57b826f626f037343f2017f540973575a21a59641e12c365b19d511ffd8_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:12f867f73893acc7aa4d6bdbb08d1ef14bc56595cce9d1c709065e34a4a81817_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:81fdd996a36fa37bf3f4c101bb25414b43c72538766a51ec4a346293eb37a63e_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-operator-bundle@sha256:8f73fe01cd4211ed37231f38fd25383cfd9b7f2ca6b9417833d2fea450cd8b7b_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:0b8b299869e821e8431e3860d6b47879ade5df19b08610a1f87b0d03a1c0ec7b_s390x", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:206382a742e2b885efb2b866a358bb1559d0c67dca0801816e12b6a9e6efc81c_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-query-rhel8@sha256:cb011bd1409ff54a7fcfdb892ead7907c86e46f8733af91a2eb3089ccbd54ee5_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:ad3d1087af547c494d7cee9b2dac6e91196ac55cf9e01f761fa3f7b1acf29ccd_ppc64le", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:d6395747de09f00b92145d2617e2d38b905a05d6805e2096769935ed7e3515ce_amd64", "8Base-RHOSDT-2.1:rhosdt/jaeger-rhel8-operator@sha256:e54f4a96ccf3006a96a3336af93390741ca18195db31252a6d29b7176464a78a_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:17bc11d364fae94c2392147297b75c3bcdc80eec7c73016eb2cd225851f96a9f_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:97584a9024698d85418baaadce793a69914c2ed0ef49398cf6609757bd85ac19_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-collector-rhel8@sha256:f11733667d88fe4411fb6d975de3ba68028895f59fe1ae70566dbd2ffbff17f0_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:3145f795e66f2fee18641e939bf076f6c335b59b13d47e5089db62f4bce1561a_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:6bf00aa0bd41ec7521219723b84e69849f528d84c17bd9d67feaa35fa46f6bae_ppc64le", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-operator-bundle@sha256:e5b754780949cf4aaec013385133817be2cae832de4a3dcc53ce2041e2922e46_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:32b6d98c6fc14499531535c301bc0f34976cf8c172898e728808bd1a31987557_amd64", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:9b890daea8a5b20722e273b7e1e12752cb739181745810ffaae6bdd5d59be84b_s390x", "8Base-RHOSDT-2.1:rhosdt/opentelemetry-rhel8-operator@sha256:d476cd325d60b035e990f241a7d2e888f59a859008b5f4c4829e7ce894951290_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2021_3431
Vulnerability from csaf_redhat
Published
2021-09-07 08:38
Modified
2024-11-05 23:53
Summary
Red Hat Security Advisory: go-toolset-1.15-golang security update
Notes
Topic
An update for go-toolset-1.15-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.15-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3431", "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3431.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.15-golang security update", "tracking": { "current_release_date": "2024-11-05T23:53:38+00:00", "generator": { "date": "2024-11-05T23:53:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:3431", "initial_release_date": "2021-09-07T08:38:58+00:00", "revision_history": [ { "date": "2021-09-07T08:38:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-07T08:38:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T23:53:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2021" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2021" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-race@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "product": { "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "product_id": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-docs@1.15.14-2.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch" }, "product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch" }, "product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-07T08:38:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-07T08:38:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-07T08:38:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" } ] }
rhsa-2022_0998
Vulnerability from csaf_redhat
Published
2022-03-23 22:12
Modified
2024-11-06 00:35
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update
Notes
Topic
An update for golang-github-vbatts-tar-split is now available for Red Hat
OpenStack Platform 16.2 (Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Security Fix(es):
* net: incorrect parsing of extraneous zero characters at the beginning of
an IP address octet (CVE-2021-29923)
* crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang-github-vbatts-tar-split is now available for Red Hat\nOpenStack Platform 16.2 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n\n* crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0998", "url": "https://access.redhat.com/errata/RHSA-2022:0998" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0998.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update", "tracking": { "current_release_date": "2024-11-06T00:35:32+00:00", "generator": { "date": "2024-11-06T00:35:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0998", "initial_release_date": "2022-03-23T22:12:28+00:00", "revision_history": [ { "date": "2022-03-23T22:12:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-23T22:12:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:35:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "product": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "product": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "product": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le" }, "product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src" }, "product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" }, "product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T22:12:28+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0998" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-23T22:12:28+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0998" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.2:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2022_1276
Vulnerability from csaf_redhat
Published
2022-04-07 18:02
Modified
2024-11-06 00:39
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update
Notes
Topic
Red Hat OpenShift Service Mesh 2.0.9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)
* envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)
* istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)
* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)
* envoy: Use-after-free when response filters increase response data (CVE-2021-43825)
* envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)
* envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)
* istio: unauthenticated control plane denial of service attack (CVE-2022-23635)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 2.0.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)\n\n* envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)\n\n* istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)\n\n* envoy: Use-after-free when response filters increase response data (CVE-2021-43825)\n\n* envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)\n\n* envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)\n\n* istio: unauthenticated control plane denial of service attack (CVE-2022-23635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1276", "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1954368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "2050744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744" }, { "category": "external", "summary": "2050746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746" }, { "category": "external", "summary": "2050748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748" }, { "category": "external", "summary": "2050753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753" }, { "category": "external", "summary": "2050757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757" }, { "category": "external", "summary": "2050758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758" }, { "category": "external", "summary": "2057277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277" }, { "category": "external", "summary": "2061638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1276.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update", "tracking": { "current_release_date": "2024-11-06T00:39:27+00:00", "generator": { "date": "2024-11-06T00:39:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:1276", "initial_release_date": "2022-04-07T18:02:07+00:00", "revision_history": [ { "date": "2022-04-07T18:02:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-07T18:02:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:39:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.0", "product": { "name": "OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.src", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.src", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.src", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.src", "product_id": "servicemesh-operator-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-0:2.0.9-3.el8.src", "product_id": "servicemesh-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=src" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.src", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.src", "product_id": "servicemesh-cni-0:2.0.9-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "product_id": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "product_id": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "product": { "name": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "product_id": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.24.7.redhat1-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-operator-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-operator-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.9-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "product": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "product_id": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-16.el8.1?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.0.9-3.el8.s390x", "product": { "name": "servicemesh-cni-0:2.0.9-3.el8.s390x", "product_id": "servicemesh-cni-0:2.0.9-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.9-3.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.24.7.redhat1-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" }, "product_reference": "kiali-0:v1.24.7.redhat1-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-mixc-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-mixs-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-operator-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.9-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:2.0.9-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-29482", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954368" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/ulikunitz/xz. The function readUvarint may not terminate a loop what could lead to denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth authentication, therefore the impact is low.\nIn OCP before 4.7 the buildah, skopeo and podman packages include vulnerable version of github.com/ulikunitz/xz, but these OCP releases are already in the Maintenance Phase of the support, hence affected components are marked as wontfix. This may be fixed in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29482" }, { "category": "external", "summary": "RHBZ#1954368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482" } ], "release_date": "2020-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service" }, { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2021-43824", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050744" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. A crafted request can potentially trigger a NULL pointer dereference when using a WT filter safe_regex match.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Null pointer dereference when using JWT filter safe_regex match", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43824" }, { "category": "external", "summary": "RHBZ#2050744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43824", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43824" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Null pointer dereference when using JWT filter safe_regex match" }, { "cve": "CVE-2021-43825", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050746" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. If the amount of buffered data by envoy goes over the limit, the buffer may overflow while a response is being processed by the filter chain. This issue possibly causes the operation to abort incorrectly, resulting in the access of a freed memory block.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Use-after-free when response filters increase response data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43825" }, { "category": "external", "summary": "RHBZ#2050746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050746" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43825", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43825" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Use-after-free when response filters increase response data" }, { "cve": "CVE-2021-43826", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050748" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. If a downstream source disconnects during upstream connection establishment when tunneling TCP over HTTP, a use-after-free can occur, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Use-after-free when tunneling TCP over HTTP", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43826" }, { "category": "external", "summary": "RHBZ#2050748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43826", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43826" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Use-after-free when tunneling TCP over HTTP" }, { "cve": "CVE-2022-21654", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050753" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. When certificate validation settings are changed, incorrect configuration handling allows TLS session reuse without revalidation.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21654" }, { "category": "external", "summary": "RHBZ#2050753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050753" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21654", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21654" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation" }, { "cve": "CVE-2022-21655", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050757" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. Due to incorrect handling of the common router, a segfault is possible when internal redirects are routes with a direct response entry.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Incorrect handling of internal redirects to routes with a direct response entry", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21655" }, { "category": "external", "summary": "RHBZ#2050757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21655" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: Incorrect handling of internal redirects to routes with a direct response entry" }, { "cve": "CVE-2022-23606", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-02-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050758" } ], "notes": [ { "category": "description", "text": "A flaw was found in envoy. When a cluster is deleted via the Cluster Discovery Service, a stack exhaustion may occur.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23606" }, { "category": "external", "summary": "RHBZ#2050758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050758" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23606", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23606" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23606" }, { "category": "external", "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf", "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf" } ], "release_date": "2022-02-22T07:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service" }, { "cve": "CVE-2022-23635", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2022-02-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2057277" } ], "notes": [ { "category": "description", "text": "A flaw was found in istio. This flaw allows an attacker to send a specially crafted message to isitiod, causing the control plane to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio: unauthenticated control plane denial of service attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23635" }, { "category": "external", "summary": "RHBZ#2057277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23635" }, { "category": "external", "summary": "https://istio.io/latest/news/security/istio-security-2022-003", "url": "https://istio.io/latest/news/security/istio-security-2022-003" } ], "release_date": "2022-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "istio: unauthenticated control plane denial of service attack" }, { "acknowledgments": [ { "names": [ "Oliver Liu, John Howard and Jacob Delgado" ], "organization": "Istio Product Security Working Group", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-24726", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-03-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061638" } ], "notes": [ { "category": "description", "text": "A stack exhaustion flaw was found in the Istio control plane. This flaw allows a remote unauthenticated attacker to send a specially crafted or oversized message to crash the control plane process, resulting in a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.ppc64le", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.s390x", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.src", "8Base-OSSM-2.0:kiali-0:v1.24.7.redhat1-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-16.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.9-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24726" }, { "category": "external", "summary": "RHBZ#2061638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24726", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24726" }, { "category": "external", "summary": "https://istio.io/latest/news/security/istio-security-2022-004/", "url": "https://istio.io/latest/news/security/istio-security-2022-004/" } ], "release_date": "2022-03-09T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T18:02:07+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.9-3.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.9-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio: Unauthenticated control plane denial of service attack due to stack exhaustion" } ] }
rhsa-2022_0988
Vulnerability from csaf_redhat
Published
2022-03-24 10:59
Modified
2024-11-06 00:36
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update
Notes
Topic
An update for golang-github-vbatts-tar-split is now available for Red Hat
OpenStack Platform 16.1 (Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Security Fix(es):
* net: incorrect parsing of extraneous zero characters at the beginning of
an IP address octet (CVE-2021-29923)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang-github-vbatts-tar-split is now available for Red Hat\nOpenStack Platform 16.1 (Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* net: incorrect parsing of extraneous zero characters at the beginning of\nan IP address octet (CVE-2021-29923)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0988", "url": "https://access.redhat.com/errata/RHSA-2022:0988" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2020629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020629" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0988.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update", "tracking": { "current_release_date": "2024-11-06T00:36:38+00:00", "generator": { "date": "2024-11-06T00:36:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0988", "initial_release_date": "2022-03-24T10:59:08+00:00", "revision_history": [ { "date": "2022-03-24T10:59:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T10:59:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:36:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "product": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "product": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "product": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "product_id": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-vbatts-tar-split@0.11.1-6.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le" }, "product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src" }, "product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" }, "product_reference": "golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T10:59:08+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T10:59:08+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.ppc64le", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.src", "8Base-RHOS-16.1:golang-github-vbatts-tar-split-0:0.11.1-6.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
gsd-2021-29923
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-29923", "description": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.", "id": "GSD-2021-29923", "references": [ "https://www.suse.com/security/cve/CVE-2021-29923.html", "https://access.redhat.com/errata/RHSA-2022:0561", "https://access.redhat.com/errata/RHSA-2022:0557", "https://access.redhat.com/errata/RHSA-2022:0434", "https://access.redhat.com/errata/RHSA-2022:0432", "https://access.redhat.com/errata/RHSA-2022:0431", "https://access.redhat.com/errata/RHSA-2022:0318", "https://access.redhat.com/errata/RHSA-2022:0260", "https://access.redhat.com/errata/RHSA-2022:0237", "https://access.redhat.com/errata/RHSA-2021:4914", "https://access.redhat.com/errata/RHSA-2021:4910", "https://access.redhat.com/errata/RHSA-2021:4902", "https://access.redhat.com/errata/RHSA-2021:4725", "https://access.redhat.com/errata/RHSA-2021:4722", "https://access.redhat.com/errata/RHSA-2021:3585", "https://access.redhat.com/errata/RHSA-2021:3431", "https://security.archlinux.org/CVE-2021-29923", "https://access.redhat.com/errata/RHSA-2022:0577", "https://access.redhat.com/errata/RHSA-2022:0947", "https://access.redhat.com/errata/RHSA-2022:0988", "https://access.redhat.com/errata/RHSA-2022:0989", "https://access.redhat.com/errata/RHSA-2022:0997", "https://access.redhat.com/errata/RHSA-2022:0998", "https://access.redhat.com/errata/RHSA-2022:1276", "https://access.redhat.com/errata/RHSA-2022:1372", "https://linux.oracle.com/cve/CVE-2021-29923.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-29923" ], "details": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.", "id": "GSD-2021-29923", "modified": "2023-12-13T01:23:36.622313Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-29923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://golang.org/pkg/net/#ParseCIDR", "refsource": "MISC", "url": "https://golang.org/pkg/net/#ParseCIDR" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis", "refsource": "MISC", "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "name": "https://github.com/golang/go/issues/43389", "refsource": "MISC", "url": "https://github.com/golang/go/issues/43389" }, { "name": "https://github.com/golang/go/issues/30999", "refsource": "MISC", "url": "https://github.com/golang/go/issues/30999" }, { "name": "https://go-review.googlesource.com/c/go/+/325829/", "refsource": "MISC", "url": "https://go-review.googlesource.com/c/go/+/325829/" }, { "name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md", "refsource": "MISC", "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md" }, { "name": "FEDORA-2022-17d004ed71", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.1.1.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-29923" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/golang/go/issues/43389", "refsource": "MISC", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/43389" }, { "name": "https://github.com/golang/go/issues/30999", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/30999" }, { "name": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "name": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md" }, { "name": "https://golang.org/pkg/net/#ParseCIDR", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://golang.org/pkg/net/#ParseCIDR" }, { "name": "https://go-review.googlesource.com/c/go/+/325829/", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://go-review.googlesource.com/c/go/+/325829/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "FEDORA-2022-17d004ed71", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-09-14T21:11Z", "publishedDate": "2021-08-07T17:15Z" } } }
ghsa-38h6-vxp4-qxvm
Vulnerability from github
Published
2022-05-24 19:10
Modified
2022-05-24 19:10
Severity ?
Details
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
{ "affected": [], "aliases": [ "CVE-2021-29923" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-07T17:15:00Z", "severity": "HIGH" }, "details": "Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.", "id": "GHSA-38h6-vxp4-qxvm", "modified": "2022-05-24T19:10:21Z", "published": "2022-05-24T19:10:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "type": "WEB", "url": "https://github.com/golang/go/issues/30999" }, { "type": "WEB", "url": "https://github.com/golang/go/issues/43389" }, { "type": "WEB", "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "type": "WEB", "url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md" }, { "type": "WEB", "url": "https://go-review.googlesource.com/c/go/+/325829" }, { "type": "WEB", "url": "https://golang.org/pkg/net/#ParseCIDR" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CHKSFMHZVOBCZSSVRE3UEYNKARTBMTM" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-02" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ] }
wid-sec-w-2022-0970
Vulnerability from csaf_certbund
Published
2022-04-07 22:00
Modified
2024-05-21 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0970 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0970.json" }, { "category": "self", "summary": "WID-SEC-2022-0970 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0970" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4668 vom 2022-05-19", "url": "https://access.redhat.com/errata/RHSA-2022:4668" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-04-07", "url": "https://access.redhat.com/errata/RHSA-2022:1275" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-04-07", "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1679 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1679" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9362 vom 2022-05-09", "url": "https://linux.oracle.com/errata/ELSA-2022-9362.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-02 vom 2022-08-09", "url": "https://security.gentoo.org/glsa/202208-02" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7129 vom 2022-10-26", "url": "https://linux.oracle.com/errata/ELSA-2022-7129.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7129 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7129" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7457 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7457" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7954 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2303 vom 2023-10-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2303.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2944 vom 2024-05-21", "url": "https://access.redhat.com/errata/RHSA-2024:2944" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T08:37:47.134+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0970", "initial_release_date": "2022-04-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Container Platform 4", "product": { "name": "Red Hat OpenShift Container Platform 4", "product_id": "T022509", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4" } } }, { "category": "product_version_range", "name": "Service Mesh \u003c2.1.2", "product": { "name": "Red Hat OpenShift Service Mesh \u003c2.1.2", "product_id": "T022580", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh__2.1.2" } } }, { "category": "product_version_range", "name": "Service Mesh \u003c2.0.9", "product": { "name": "Red Hat OpenShift Service Mesh \u003c2.0.9", "product_id": "T022581", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh__2.0.9" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-28852", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2020-28852" }, { "cve": "CVE-2021-29482", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-29482" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-3121", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-3121" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-3749", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-3749" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-43824", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43824" }, { "cve": "CVE-2021-43825", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43825" }, { "cve": "CVE-2021-43826", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2021-43826" }, { "cve": "CVE-2022-21654", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-21654" }, { "cve": "CVE-2022-21655", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-21655" }, { "cve": "CVE-2022-23606", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-23606" }, { "cve": "CVE-2022-23635", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-23635" }, { "cve": "CVE-2022-24726", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten envoy, golang, github.com/gogo/protobuf, Node.js Axios und github.com/ulikunitz/xz. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914", "T022509" ] }, "release_date": "2022-04-07T22:00:00Z", "title": "CVE-2022-24726" } ] }
wid-sec-w-2022-0941
Vulnerability from csaf_certbund
Published
2021-08-09 22:00
Modified
2024-05-21 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um die Integrität und die Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um die Integrit\u00e4t und die Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0941 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0941.json" }, { "category": "self", "summary": "WID-SEC-2022-0941 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0941" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3759 vom 2021-10-18", "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3820 vom 2021-10-19", "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "external", "summary": "RedHat Security Advisory RHSA-2021:2984 vom 2021-08-09", "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "category": "external", "summary": "RedHat Security Advisory RHSA-2021:2983 vom 2021-08-10", "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4156 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4226 vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3009 vom 2021-08-12", "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3146 vom 2021-08-12", "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3229 vom 2021-08-20", "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3248 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3431 vom 2021-09-07", "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3454 vom 2021-09-08", "url": "https://access.redhat.com/errata/RHSA-2021:3454" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3487 vom 2021-09-15", "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3556 vom 2021-09-17", "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3555 vom 2021-09-16", "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3598 vom 2021-09-21", "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3585 vom 2021-09-21", "url": "https://access.redhat.com/errata/RHSA-2021:3585" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3585 vom 2021-09-22", "url": "http://linux.oracle.com/errata/ELSA-2021-3585.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4104 vom 2021-11-02", "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4725 vom 2021-11-17", "url": "https://access.redhat.com/errata/RHSA-2021:4725" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4722 vom 2021-11-17", "url": "https://access.redhat.com/errata/RHSA-2021:4722" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4902 vom 2021-12-01", "url": "https://access.redhat.com/errata/RHSA-2021:4902" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4914 vom 2021-12-02", "url": "https://access.redhat.com/errata/RHSA-2021:4914" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4910 vom 2021-12-02", "url": "https://access.redhat.com/errata/RHSA-2021:4910" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5072 vom 2021-12-10", "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5086 vom 2021-12-13", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5085 vom 2021-12-13", "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0191 vom 2022-01-20", "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0237 vom 2022-01-24", "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0260 vom 2022-01-25", "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0432 vom 2022-02-03", "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0431 vom 2022-02-03", "url": "https://access.redhat.com/errata/RHSA-2022:0431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0557 vom 2022-02-23", "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0561 vom 2022-02-23", "url": "https://access.redhat.com/errata/RHSA-2022:0561" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0947 vom 2022-03-16", "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0997 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0997" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0998 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0998" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0989 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0989" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0988 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0988" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0577 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1276 vom 2022-04-08", "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1329 vom 2022-04-12", "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1372 vom 2022-04-14", "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1402 vom 2022-04-19", "url": "https://access.redhat.com/errata/RHSA-2022:1402" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1830 vom 2022-08-08", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1830.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-02 vom 2022-08-09", "url": "https://security.gentoo.org/glsa/202208-02" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7954 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7955 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7955" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8008 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8008" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7955 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-7955.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2586 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2586" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2988" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T09:10:52.845+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0941", "initial_release_date": "2021-08-09T22:00:00.000+00:00", "revision_history": [ { "date": "2021-08-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-08-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-30T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-31T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-14T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-16T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-22T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-18T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-10-19T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-02T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-09T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-17T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-01T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-02T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-09T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-13T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-19T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-24T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-25T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-03T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-23T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-16T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-23T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-24T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-28T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-07T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-12T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-13T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-19T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-23T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-01T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "41" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c4.8.4", "product": { "name": "Red Hat OpenShift \u003c4.8.4", "product_id": "T020080", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8.4" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-33198" } ] }
wid-sec-w-2022-1335
Vulnerability from csaf_certbund
Published
2022-09-07 22:00
Modified
2023-05-18 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1335 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json" }, { "category": "self", "summary": "WID-SEC-2022-1335 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-021 vom 2022-09-07", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:57:44.642+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1335", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2021-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-0561" }, { "cve": "CVE-2021-21708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-21708" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-30809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30897" }, { "cve": "CVE-2021-30934", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30934" }, { "cve": "CVE-2021-30936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30936" }, { "cve": "CVE-2021-30951", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30951" }, { "cve": "CVE-2021-30952", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30952" }, { "cve": "CVE-2021-30953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30953" }, { "cve": "CVE-2021-30954", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30954" }, { "cve": "CVE-2021-30984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30984" }, { "cve": "CVE-2021-3448", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-3448" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-4115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4115" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4217" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-45481", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45481" }, { "cve": "CVE-2021-45482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45482" }, { "cve": "CVE-2021-45483", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45483" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0156", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0156" }, { "cve": "CVE-2022-0158", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0158" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0408" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0417" }, { "cve": "CVE-2022-0443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0443" }, { "cve": "CVE-2022-0554", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0554" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0572" }, { "cve": "CVE-2022-0629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0629" }, { "cve": "CVE-2022-0685", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0685" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0714", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0714" }, { "cve": "CVE-2022-0729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0729" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1097" }, { "cve": "CVE-2022-1196", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1196" }, { "cve": "CVE-2022-1197", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1197" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1520", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1520" }, { "cve": "CVE-2022-1834", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1834" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21514", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21514" }, { "cve": "CVE-2022-21524", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21524" }, { "cve": "CVE-2022-21533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21533" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-22590", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22590" }, { "cve": "CVE-2022-22592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22592" }, { "cve": "CVE-2022-22620", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22620" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24130", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24130" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24713", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24713" }, { "cve": "CVE-2022-24801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24801" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25762" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26486" }, { "cve": "CVE-2022-28281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28281" }, { "cve": "CVE-2022-28282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28282" }, { "cve": "CVE-2022-28285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28285" }, { "cve": "CVE-2022-28286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28286" }, { "cve": "CVE-2022-28289", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28289" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28346", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28346" }, { "cve": "CVE-2022-28347", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28347" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-29909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29909" }, { "cve": "CVE-2022-29911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29911" }, { "cve": "CVE-2022-29912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29912" }, { "cve": "CVE-2022-29913", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29913" }, { "cve": "CVE-2022-29914", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29914" }, { "cve": "CVE-2022-29916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29916" }, { "cve": "CVE-2022-29917", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29917" }, { "cve": "CVE-2022-31736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31736" }, { "cve": "CVE-2022-31737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31737" }, { "cve": "CVE-2022-31738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31738" }, { "cve": "CVE-2022-31739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31739" }, { "cve": "CVE-2022-3174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-3174" }, { "cve": "CVE-2022-31740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31740" }, { "cve": "CVE-2022-31741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31741" }, { "cve": "CVE-2022-31742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31742" }, { "cve": "CVE-2022-31747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31747" }, { "cve": "CVE-2022-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-4187" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.